news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] freetype (SSA:2017-136-01) New freetype packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/freetype-2.6.3-i586-2_slack14.2.txz: Rebuilt. This update fixes an out-of-bounds write caused by a heap-based buffer overflow related to the t1_builder_close_contour function in psaux/psobjs.c. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287 (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/freetype-2.5.5-i486-2_slack13.0.txz Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/freetype-2.5.5-x86_64-2_slack13.0.txz Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/freetype-2.5.5-i486-2_slack13.1.txz Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/freetype-2.5.5-x86_64-2_slack13.1.txz Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/freetype-2.5.5-i486-2_slack13.37.txz Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/freetype-2.5.5-x86_64-2_slack13.37.txz Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/freetype-2.5.5-i486-2_slack14.0.txz Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/freetype-2.5.5-x86_64-2_slack14.0.txz Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/freetype-2.5.5-i486-2_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/freetype-2.5.5-x86_64-2_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/freetype-2.6.3-i586-2_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/freetype-2.6.3-x86_64-2_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/freetype-2.8-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/freetype-2.8-x86_64-1.txz MD5 signatures: +-------------+ Slackware 13.0 package: 446731b8fe9d963a92d61fd2b5351fc5 freetype-2.5.5-i486-2_slack13.0.txz Slackware x86_64 13.0 package: 01625aae45dee3c304411bf1fb351316 freetype-2.5.5-x86_64-2_slack13.0.txz Slackware 13.1 package: 1fb0d01a3a97f668223a8d285d99ea9f freetype-2.5.5-i486-2_slack13.1.txz Slackware x86_64 13.1 package: b630acf7704287e30cb3cc7c76db8688 freetype-2.5.5-x86_64-2_slack13.1.txz Slackware 13.37 package: 548427cfb4a056da78898d99c3fda0b8 freetype-2.5.5-i486-2_slack13.37.txz Slackware x86_64 13.37 package: 798fead16aa8797c2d8d25fe82f8d817 freetype-2.5.5-x86_64-2_slack13.37.txz Slackware 14.0 package: 395e23508be4295d021457eddf1e5525 freetype-2.5.5-i486-2_slack14.0.txz Slackware x86_64 14.0 package: 8f26a6a9feba6c8b5c7bb374409b7f28 freetype-2.5.5-x86_64-2_slack14.0.txz Slackware 14.1 package: 3bb485a17f53b99061958222414c438f freetype-2.5.5-i486-2_slack14.1.txz Slackware x86_64 14.1 package: c4f9c2fbad18ca30366a2a733286a21c freetype-2.5.5-x86_64-2_slack14.1.txz Slackware 14.2 package: c0da023da3bb15bf69fbaec8356a1ddf freetype-2.6.3-i586-2_slack14.2.txz Slackware x86_64 14.2 package: e715d316951b9fbdc607329d04f32f92 freetype-2.6.3-x86_64-2_slack14.2.txz Slackware -current package: 9373898b5965010dd6e0ecb9740ed162 l/freetype-2.8-i586-1.txz Slackware x86_64 -current package: 11bdaa38c2ebb311cc0a26795efe021a l/freetype-2.8-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg freetype-2.6.3-i586-2_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
-
[security-announce] SUSE-SU-2017:1314-1: important: Security update for libtirpc
news posted a topic in Upcoming News
SUSE Security Update: Security update for libtirpc ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1314-1 Rating: important References: #1037559 Cross-References: CVE-2017-8779 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP2 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 SUSE Linux Enterprise Server 12-SP2 SUSE Linux Enterprise Desktop 12-SP2 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for libtirpc fixes the following issues: - CVE-2017-8779: crafted UDP packaged could lead rpcbind to denial-of-service (bsc#1037559) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-796=1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-796=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-796=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-796=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64): libtirpc-debugsource-1.0.1-16.1 libtirpc-devel-1.0.1-16.1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): libtirpc-debugsource-1.0.1-16.1 libtirpc-netconfig-1.0.1-16.1 libtirpc3-1.0.1-16.1 libtirpc3-debuginfo-1.0.1-16.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64): libtirpc-debugsource-1.0.1-16.1 libtirpc-netconfig-1.0.1-16.1 libtirpc3-1.0.1-16.1 libtirpc3-debuginfo-1.0.1-16.1 - SUSE Linux Enterprise Server 12-SP2 (x86_64): libtirpc3-32bit-1.0.1-16.1 libtirpc3-debuginfo-32bit-1.0.1-16.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): libtirpc-debugsource-1.0.1-16.1 libtirpc-netconfig-1.0.1-16.1 libtirpc3-1.0.1-16.1 libtirpc3-32bit-1.0.1-16.1 libtirpc3-debuginfo-1.0.1-16.1 libtirpc3-debuginfo-32bit-1.0.1-16.1 References: https://www.suse.com/security/cve/CVE-2017-8779.html https://bugzilla.suse.com/1037559 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
[security-announce] SUSE-SU-2017:1315-1: important: Security update for mariadb
news posted a topic in Upcoming News
SUSE Security Update: Security update for mariadb ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1315-1 Rating: important References: #1020868 #1020890 #1020976 #1022428 #1034911 #996821 Cross-References: CVE-2017-3302 CVE-2017-3313 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP2 SUSE Linux Enterprise Workstation Extension 12-SP1 SUSE Linux Enterprise Software Development Kit 12-SP2 SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 SUSE Linux Enterprise Server 12-SP2 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP2 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that solves two vulnerabilities and has four fixes is now available. Description: This update for mariadb fixes the following issues: - update to MariaDB 10.0.30 GA * notable changes: * XtraDB updated to 5.6.35-80.0 * TokuDB updated to 5.6.35-80.0 * PCRE updated to 8.40 * MDEV-11027: better InnoDB crash recovery progress reporting * MDEV-11520: improvements to how InnoDB data files are extended * Improvements to InnoDB startup/shutdown to make it more robust * MDEV-11233: fix for FULLTEXT index crash * MDEV-6143: MariaDB Linux binary tarballs will now always untar to directories that match their filename * release notes and changelog: * https://kb.askmonty.org/en/mariadb-10030-release-notes * https://kb.askmonty.org/en/mariadb-10030-changelog * fixes the following CVEs: CVE-2017-3313: unspecified vulnerability affecting the InnoDB component [bsc#1020890] CVE-2017-3302: Use after free in libmysqlclient.so [bsc#1022428] - set the default umask to 077 in mysql-systemd-helper [bsc#1020976] - [bsc#1034911] - tracker bug * fixes also [bsc#1020868] Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP2: zypper in -t patch SUSE-SLE-WE-12-SP2-2017-795=1 - SUSE Linux Enterprise Workstation Extension 12-SP1: zypper in -t patch SUSE-SLE-WE-12-SP1-2017-795=1 - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-795=1 - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-795=1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-795=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-795=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-795=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-795=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-795=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64): libmysqlclient_r18-10.0.30-25.1 libmysqlclient_r18-32bit-10.0.30-25.1 mariadb-debuginfo-10.0.30-25.1 mariadb-debugsource-10.0.30-25.1 - SUSE Linux Enterprise Workstation Extension 12-SP1 (x86_64): libmysqlclient_r18-10.0.30-25.1 libmysqlclient_r18-32bit-10.0.30-25.1 mariadb-debuginfo-10.0.30-25.1 mariadb-debugsource-10.0.30-25.1 - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64): libmysqlclient-devel-10.0.30-25.1 libmysqlclient_r18-10.0.30-25.1 libmysqld-devel-10.0.30-25.1 libmysqld18-10.0.30-25.1 libmysqld18-debuginfo-10.0.30-25.1 mariadb-debuginfo-10.0.30-25.1 mariadb-debugsource-10.0.30-25.1 - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): libmysqlclient-devel-10.0.30-25.1 libmysqlclient_r18-10.0.30-25.1 libmysqld-devel-10.0.30-25.1 libmysqld18-10.0.30-25.1 libmysqld18-debuginfo-10.0.30-25.1 mariadb-debuginfo-10.0.30-25.1 mariadb-debugsource-10.0.30-25.1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): libmysqlclient18-10.0.30-25.1 libmysqlclient18-debuginfo-10.0.30-25.1 mariadb-10.0.30-25.1 mariadb-client-10.0.30-25.1 mariadb-client-debuginfo-10.0.30-25.1 mariadb-debuginfo-10.0.30-25.1 mariadb-debugsource-10.0.30-25.1 mariadb-errormessages-10.0.30-25.1 mariadb-tools-10.0.30-25.1 mariadb-tools-debuginfo-10.0.30-25.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64): libmysqlclient18-10.0.30-25.1 libmysqlclient18-debuginfo-10.0.30-25.1 mariadb-10.0.30-25.1 mariadb-client-10.0.30-25.1 mariadb-client-debuginfo-10.0.30-25.1 mariadb-debuginfo-10.0.30-25.1 mariadb-debugsource-10.0.30-25.1 mariadb-errormessages-10.0.30-25.1 mariadb-tools-10.0.30-25.1 mariadb-tools-debuginfo-10.0.30-25.1 - SUSE Linux Enterprise Server 12-SP2 (x86_64): libmysqlclient18-32bit-10.0.30-25.1 libmysqlclient18-debuginfo-32bit-10.0.30-25.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): libmysqlclient18-10.0.30-25.1 libmysqlclient18-debuginfo-10.0.30-25.1 mariadb-10.0.30-25.1 mariadb-client-10.0.30-25.1 mariadb-client-debuginfo-10.0.30-25.1 mariadb-debuginfo-10.0.30-25.1 mariadb-debugsource-10.0.30-25.1 mariadb-errormessages-10.0.30-25.1 mariadb-tools-10.0.30-25.1 mariadb-tools-debuginfo-10.0.30-25.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): libmysqlclient18-32bit-10.0.30-25.1 libmysqlclient18-debuginfo-32bit-10.0.30-25.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): libmysqlclient18-10.0.30-25.1 libmysqlclient18-32bit-10.0.30-25.1 libmysqlclient18-debuginfo-10.0.30-25.1 libmysqlclient18-debuginfo-32bit-10.0.30-25.1 libmysqlclient_r18-10.0.30-25.1 libmysqlclient_r18-32bit-10.0.30-25.1 mariadb-10.0.30-25.1 mariadb-client-10.0.30-25.1 mariadb-client-debuginfo-10.0.30-25.1 mariadb-debuginfo-10.0.30-25.1 mariadb-debugsource-10.0.30-25.1 mariadb-errormessages-10.0.30-25.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): libmysqlclient18-10.0.30-25.1 libmysqlclient18-32bit-10.0.30-25.1 libmysqlclient18-debuginfo-10.0.30-25.1 libmysqlclient18-debuginfo-32bit-10.0.30-25.1 libmysqlclient_r18-10.0.30-25.1 libmysqlclient_r18-32bit-10.0.30-25.1 mariadb-10.0.30-25.1 mariadb-client-10.0.30-25.1 mariadb-client-debuginfo-10.0.30-25.1 mariadb-debuginfo-10.0.30-25.1 mariadb-debugsource-10.0.30-25.1 mariadb-errormessages-10.0.30-25.1 References: https://www.suse.com/security/cve/CVE-2017-3302.html https://www.suse.com/security/cve/CVE-2017-3313.html https://bugzilla.suse.com/1020868 https://bugzilla.suse.com/1020890 https://bugzilla.suse.com/1020976 https://bugzilla.suse.com/1022428 https://bugzilla.suse.com/1034911 https://bugzilla.suse.com/996821 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
[security-announce] SUSE-SU-2017:1311-1: important: Security update for mariadb
news posted a topic in Upcoming News
SUSE Security Update: Security update for mariadb ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1311-1 Rating: important References: #1020890 #1020976 #1022428 #1034911 Cross-References: CVE-2017-3302 CVE-2017-3313 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: This update for mariadb fixes the following issues: - update to MariaDB 10.0.30 GA * notable changes: * XtraDB updated to 5.6.35-80.0 * TokuDB updated to 5.6.35-80.0 * PCRE updated to 8.40 * MDEV-11027: better InnoDB crash recovery progress reporting * MDEV-11520: improvements to how InnoDB data files are extended * Improvements to InnoDB startup/shutdown to make it more robust * MDEV-11233: fix for FULLTEXT index crash * MDEV-6143: MariaDB Linux binary tarballs will now always untar to directories that match their filename * release notes and changelog: * https://kb.askmonty.org/en/mariadb-10030-release-notes * https://kb.askmonty.org/en/mariadb-10030-changelog * fixes the following CVEs: CVE-2017-3313: unspecified vulnerability affecting the InnoDB component [bsc#1020890] CVE-2017-3302: Use after free in libmysqlclient.so [bsc#1022428] - set the default umask to 077 in rc.mysql-multi [bsc#1020976] - [bsc#1034911] - tracker bug - increase build disk size from 10 GB to 13 GB in order to fix build for aarch64 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-792=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-792=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): libmysqlclient-devel-10.0.30-20.26.1 libmysqlclient18-10.0.30-20.26.1 libmysqlclient18-32bit-10.0.30-20.26.1 libmysqlclient18-debuginfo-10.0.30-20.26.1 libmysqlclient18-debuginfo-32bit-10.0.30-20.26.1 libmysqlclient_r18-10.0.30-20.26.1 libmysqld-devel-10.0.30-20.26.1 libmysqld18-10.0.30-20.26.1 libmysqld18-debuginfo-10.0.30-20.26.1 mariadb-10.0.30-20.26.1 mariadb-client-10.0.30-20.26.1 mariadb-client-debuginfo-10.0.30-20.26.1 mariadb-debuginfo-10.0.30-20.26.1 mariadb-debugsource-10.0.30-20.26.1 mariadb-errormessages-10.0.30-20.26.1 mariadb-tools-10.0.30-20.26.1 mariadb-tools-debuginfo-10.0.30-20.26.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): libmysqlclient-devel-10.0.30-20.26.1 libmysqlclient18-10.0.30-20.26.1 libmysqlclient18-32bit-10.0.30-20.26.1 libmysqlclient18-debuginfo-10.0.30-20.26.1 libmysqlclient18-debuginfo-32bit-10.0.30-20.26.1 libmysqlclient_r18-10.0.30-20.26.1 libmysqld-devel-10.0.30-20.26.1 libmysqld18-10.0.30-20.26.1 libmysqld18-debuginfo-10.0.30-20.26.1 mariadb-10.0.30-20.26.1 mariadb-client-10.0.30-20.26.1 mariadb-client-debuginfo-10.0.30-20.26.1 mariadb-debuginfo-10.0.30-20.26.1 mariadb-debugsource-10.0.30-20.26.1 mariadb-errormessages-10.0.30-20.26.1 mariadb-tools-10.0.30-20.26.1 mariadb-tools-debuginfo-10.0.30-20.26.1 References: https://www.suse.com/security/cve/CVE-2017-3302.html https://www.suse.com/security/cve/CVE-2017-3313.html https://bugzilla.suse.com/1020890 https://bugzilla.suse.com/1020976 https://bugzilla.suse.com/1022428 https://bugzilla.suse.com/1034911 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: AMD Ryzen 5 1600 3.2 GHz Link: https://www.techpowerup.com/reviews/AMD/Ryzen_5_1600 Brief: AMD's Ryzen 5 1600 is a six-core processor with twelve logical cores, which turns out to be a cost-effective alternative to the Ryzen 5 1600X, which is only marginally faster. The 1600 also offers good overclocking potential, going beyond the clock limits of AMD Precision Boost and XFR.
-
[security-announce] SUSE-SU-2017:1306-1: important: Security update for libtirpc
news posted a topic in Upcoming News
SUSE Security Update: Security update for libtirpc ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1306-1 Rating: important References: #1037559 Cross-References: CVE-2017-8779 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP1 SUSE Linux Enterprise Server 12-SP1 SUSE Linux Enterprise Desktop 12-SP1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for libtirpc fixes the following issues: - CVE-2017-8779: crafted UDP packaged could lead rpcbind to denial-of-service (bsc#1037559) Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP1: zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-788=1 - SUSE Linux Enterprise Server 12-SP1: zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-788=1 - SUSE Linux Enterprise Desktop 12-SP1: zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-788=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64): libtirpc-debugsource-0.2.3-13.3.1 libtirpc-devel-0.2.3-13.3.1 - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64): libtirpc-debugsource-0.2.3-13.3.1 libtirpc1-0.2.3-13.3.1 libtirpc1-debuginfo-0.2.3-13.3.1 - SUSE Linux Enterprise Server 12-SP1 (s390x x86_64): libtirpc1-32bit-0.2.3-13.3.1 libtirpc1-debuginfo-32bit-0.2.3-13.3.1 - SUSE Linux Enterprise Desktop 12-SP1 (x86_64): libtirpc-debugsource-0.2.3-13.3.1 libtirpc1-0.2.3-13.3.1 libtirpc1-32bit-0.2.3-13.3.1 libtirpc1-debuginfo-0.2.3-13.3.1 libtirpc1-debuginfo-32bit-0.2.3-13.3.1 References: https://www.suse.com/security/cve/CVE-2017-8779.html https://bugzilla.suse.com/1037559 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
SUSE Security Update: Security update for Linux Kernel Live Patch 6 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1308-1 Rating: important References: #1030575 #1031440 #1031481 #1031660 Cross-References: CVE-2017-7294 CVE-2017-7308 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: This update for the Linux Kernel 4.4.49-92_14 fixes several issues. The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1030575, bsc#1031660). - CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bsc#1031440, bsc#1031481). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-786=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_49-92_14-default-2-2.1 References: https://www.suse.com/security/cve/CVE-2017-7294.html https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031440 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
Samsung Galaxy Tab S3 Review: Premium Android Productivity And EntertainmentÂ
news posted a topic in Upcoming News
View this email in your browser (http://mailchi.mp/hothardware/intel-optane-memory-with-3d-xpoint-review-easy-robust-pc-acceleration-1082765?e=0c004f9c13) The Samsung Galaxy Tab S3 may be one of the better-equipped tablets for consumers looking for a device that has it all – multimedia and productivity chops, useful feature adds and good looks as well. With its HDR-ready screen, quad speakers, S Pen, optional keyboard, and all-glass design, the Galaxy Tab S3 has a lot to offer. The Samsung Galaxy Tab S3 features a 9.7-inch Super AMOLED display that supports HDR content, though there are some caveats to this which we’ll discuss later in this review. To further enhance the multimedia experience on this tablet, Samsung has included quad-stereo speakers as well... Samsung Galaxy Tab S3 Review: Premium Android Productivity And Entertainment (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=b5d286948f&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=fed4d08035&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=b1e058f047&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=ccae56faed&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=9925b3c795&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=28583954e1&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=35a99268e3&e=0c004f9c13 ============================================================ -
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2017:1233-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:1233 Issue date: 2017-05-16 CVE Names: CVE-2017-2636 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux HPC Node EUS (v. 6.7) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7) - x86_64 Red Hat Enterprise Linux Server EUS (v. 6.7) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.7) - i386, ppc64, s390x, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A race condition flaw was found in the N_HLDC Linux kernel driver when accessing n_hdlc.tbuf list that can lead to double free. A local, unprivileged user able to set the HDLC line discipline on the tty device could use this flaw to increase their privileges on the system. (CVE-2017-2636, Important) Red Hat would like to thank Alexander Popov for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1428319 - CVE-2017-2636 kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release() 6. Package List: Red Hat Enterprise Linux HPC Node EUS (v. 6.7): Source: kernel-2.6.32-573.42.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-573.42.1.el6.noarch.rpm kernel-doc-2.6.32-573.42.1.el6.noarch.rpm kernel-firmware-2.6.32-573.42.1.el6.noarch.rpm x86_64: kernel-2.6.32-573.42.1.el6.x86_64.rpm kernel-debug-2.6.32-573.42.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-573.42.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-573.42.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.42.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.42.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-573.42.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-573.42.1.el6.x86_64.rpm kernel-devel-2.6.32-573.42.1.el6.x86_64.rpm kernel-headers-2.6.32-573.42.1.el6.x86_64.rpm perf-2.6.32-573.42.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.42.1.el6.i686.rpm perf-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.42.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7): x86_64: kernel-debug-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-573.42.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm python-perf-2.6.32-573.42.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 6.7): Source: kernel-2.6.32-573.42.1.el6.src.rpm i386: kernel-2.6.32-573.42.1.el6.i686.rpm kernel-debug-2.6.32-573.42.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.42.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.42.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.42.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-573.42.1.el6.i686.rpm kernel-devel-2.6.32-573.42.1.el6.i686.rpm kernel-headers-2.6.32-573.42.1.el6.i686.rpm perf-2.6.32-573.42.1.el6.i686.rpm perf-debuginfo-2.6.32-573.42.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.42.1.el6.i686.rpm noarch: kernel-abi-whitelists-2.6.32-573.42.1.el6.noarch.rpm kernel-doc-2.6.32-573.42.1.el6.noarch.rpm kernel-firmware-2.6.32-573.42.1.el6.noarch.rpm ppc64: kernel-2.6.32-573.42.1.el6.ppc64.rpm kernel-bootwrapper-2.6.32-573.42.1.el6.ppc64.rpm kernel-debug-2.6.32-573.42.1.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-573.42.1.el6.ppc64.rpm kernel-debug-devel-2.6.32-573.42.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-573.42.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-573.42.1.el6.ppc64.rpm kernel-devel-2.6.32-573.42.1.el6.ppc64.rpm kernel-headers-2.6.32-573.42.1.el6.ppc64.rpm perf-2.6.32-573.42.1.el6.ppc64.rpm perf-debuginfo-2.6.32-573.42.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-573.42.1.el6.ppc64.rpm s390x: kernel-2.6.32-573.42.1.el6.s390x.rpm kernel-debug-2.6.32-573.42.1.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-573.42.1.el6.s390x.rpm kernel-debug-devel-2.6.32-573.42.1.el6.s390x.rpm kernel-debuginfo-2.6.32-573.42.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-573.42.1.el6.s390x.rpm kernel-devel-2.6.32-573.42.1.el6.s390x.rpm kernel-headers-2.6.32-573.42.1.el6.s390x.rpm kernel-kdump-2.6.32-573.42.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-573.42.1.el6.s390x.rpm kernel-kdump-devel-2.6.32-573.42.1.el6.s390x.rpm perf-2.6.32-573.42.1.el6.s390x.rpm perf-debuginfo-2.6.32-573.42.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-573.42.1.el6.s390x.rpm x86_64: kernel-2.6.32-573.42.1.el6.x86_64.rpm kernel-debug-2.6.32-573.42.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-573.42.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-573.42.1.el6.i686.rpm kernel-debug-devel-2.6.32-573.42.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.42.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-573.42.1.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-573.42.1.el6.x86_64.rpm kernel-devel-2.6.32-573.42.1.el6.x86_64.rpm kernel-headers-2.6.32-573.42.1.el6.x86_64.rpm perf-2.6.32-573.42.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.42.1.el6.i686.rpm perf-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.42.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional EUS (v. 6.7): i386: kernel-debug-debuginfo-2.6.32-573.42.1.el6.i686.rpm kernel-debuginfo-2.6.32-573.42.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-573.42.1.el6.i686.rpm perf-debuginfo-2.6.32-573.42.1.el6.i686.rpm python-perf-2.6.32-573.42.1.el6.i686.rpm python-perf-debuginfo-2.6.32-573.42.1.el6.i686.rpm ppc64: kernel-debug-debuginfo-2.6.32-573.42.1.el6.ppc64.rpm kernel-debuginfo-2.6.32-573.42.1.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-573.42.1.el6.ppc64.rpm perf-debuginfo-2.6.32-573.42.1.el6.ppc64.rpm python-perf-2.6.32-573.42.1.el6.ppc64.rpm python-perf-debuginfo-2.6.32-573.42.1.el6.ppc64.rpm s390x: kernel-debug-debuginfo-2.6.32-573.42.1.el6.s390x.rpm kernel-debuginfo-2.6.32-573.42.1.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-573.42.1.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-573.42.1.el6.s390x.rpm perf-debuginfo-2.6.32-573.42.1.el6.s390x.rpm python-perf-2.6.32-573.42.1.el6.s390x.rpm python-perf-debuginfo-2.6.32-573.42.1.el6.s390x.rpm x86_64: kernel-debug-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-573.42.1.el6.x86_64.rpm perf-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm python-perf-2.6.32-573.42.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-573.42.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-2636 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFZGuA1XlSAg2UNWIIRAhAKAJ4/G54k7Fu4g0QQQbpS7l062zoxYACfRFwg BJxvc92xYnFsEjpn+Sk1VlA= =tR3h -----END PGP SIGNATURE----- --
-
ioSafe 216 2-Bay NAS Review ------------------------------------------------------------ http://mailchi.mp/kitguru/iosafe-216-2-bay-nas-review?e=872093acb5 http://www.kitguru.net ioSafe 216 2-Bay NAS Review ioSafe may be a new name to you but the company from Auburn, California have been in the business of physical data protection since 2005 producing fireproof and waterproof storage devices for home and business users alike. The company cover all forms of storage from servers to portable external drives. The ioSafe 216 is a 2-Bay NAS for the home and small business. Read the review here: http://www.kitguru.net/professional/networking/simon-crisp/iosafe-216-2-bay-nas-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=827bd6e2d0&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: kernel security update Advisory ID: RHSA-2017:1232-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:1232 Issue date: 2017-05-16 CVE Names: CVE-2017-2636 ===================================================================== 1. Summary: An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support and Red Hat Enterprise Linux 6.5 Telco Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 6.5) - noarch, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server TUS (v. 6.5) - noarch, x86_64 3. Description: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * A race condition flaw was found in the N_HLDC Linux kernel driver when accessing n_hdlc.tbuf list that can lead to double free. A local, unprivileged user able to set the HDLC line discipline on the tty device could use this flaw to increase their privileges on the system. (CVE-2017-2636, Important) Red Hat would like to thank Alexander Popov for reporting this issue. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1428319 - CVE-2017-2636 kernel: Race condition access to n_hdlc.tbuf causes double free in n_hdlc_release() 6. Package List: Red Hat Enterprise Linux Server AUS (v. 6.5): Source: kernel-2.6.32-431.80.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-431.80.1.el6.noarch.rpm kernel-doc-2.6.32-431.80.1.el6.noarch.rpm kernel-firmware-2.6.32-431.80.1.el6.noarch.rpm x86_64: kernel-2.6.32-431.80.1.el6.x86_64.rpm kernel-debug-2.6.32-431.80.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.80.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.80.1.el6.x86_64.rpm kernel-devel-2.6.32-431.80.1.el6.x86_64.rpm kernel-headers-2.6.32-431.80.1.el6.x86_64.rpm perf-2.6.32-431.80.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 6.5): Source: kernel-2.6.32-431.80.1.el6.src.rpm noarch: kernel-abi-whitelists-2.6.32-431.80.1.el6.noarch.rpm kernel-doc-2.6.32-431.80.1.el6.noarch.rpm kernel-firmware-2.6.32-431.80.1.el6.noarch.rpm x86_64: kernel-2.6.32-431.80.1.el6.x86_64.rpm kernel-debug-2.6.32-431.80.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-431.80.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.80.1.el6.x86_64.rpm kernel-devel-2.6.32-431.80.1.el6.x86_64.rpm kernel-headers-2.6.32-431.80.1.el6.x86_64.rpm perf-2.6.32-431.80.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional AUS (v. 6.5): Source: kernel-2.6.32-431.80.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.80.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm python-perf-2.6.32-431.80.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm Red Hat Enterprise Linux Server Optional TUS (v. 6.5): Source: kernel-2.6.32-431.80.1.el6.src.rpm x86_64: kernel-debug-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-431.80.1.el6.x86_64.rpm perf-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm python-perf-2.6.32-431.80.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-431.80.1.el6.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-2636 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFZGspzXlSAg2UNWIIRAubcAJ9cXSGWdtUjeU0K279k4rFFTOaRTgCgrAWq +frrJk+ZjKEhrR82USNhFhs= =k4fV -----END PGP SIGNATURE----- --
-
Roccat Kone EMP Mouse Review ------------------------------------------------------------ http://mailchi.mp/kitguru/roccat-kone-emp-mouse-review?e=872093acb5 http://www.kitguru.net Roccat Kone EMP Mouse Review Roccat’s Kone series of mice has a strong reputation that stretches back years. Today we are looking at the new Kone EMP, a mouse that is actually the successor to 2012’s Kone XTD. Sporting fancy LED strips, an Owl Eye 12K DPI sensor plus Roccat’s ever-present Swarm software, how does the EMP fare in 2017? Read the review here: http://www.kitguru.net/peripherals/mouse/dominic-moass/roccat-kone-emp-mouse-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=2856ec12d2&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
Welcome to the Ubuntu Weekly Newsletter, Issue 507 for the weeks May 1-15, 2017. == Links to UWN == * Wiki page: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/Issue507 == In This Issue == * Mark Shuttleworth, Canonical - OpenStack Summit 2017 * Ubuntu Stats * LoCo Events * Kubuntu: 17.10 Wallpaper Contest! Call for artists * Valorie Zimmerman: Google Summer of Code students are announced today * Canonical Design Team: April's reading list * Marcos Costales: A new hope for Ubuntu Phone: The community * Aaron Honeycutt: LFNW 2017 * Other Community News * Canonical News * In The Press * In The Blogosphere * Other Articles of Interest * Featured Audio and Video * Weekly Ubuntu Development Team Meetings * Upcoming Meetings and Events * Updates and Security for 14.04, 16.04, 16.10, and 17.04 * And much more! == General Community News == === Mark Shuttleworth, Canonical - OpenStack Summit 2017 === Mark Shuttleworth had a presentation at OpenStack Summit. You can check the video here: A further video was produced the second day, which follows: == Ubuntu Stats == === Bug Stats === * Open (131597) +205 over last week * Critical (423) -3 over last week * Unconfirmed (65138) -551 over last week As always, the Bug Squad needs more help. If you want to get started, please see https://wiki.ubuntu.com/BugSquad === Ask Ubuntu Top 5 Questions this week === ==== Most Active Questions ==== * What are the default text editors in different flavours of Ubuntu? http://askubuntu.com/questions/913609/ * What is the "Wanna Cry" ransomware's possible impact on Linux users? http://askubuntu.com/questions/914623/ * How can I know from which partition I had booted? http://askubuntu.com/questions/913706/ * Why are the operating system and kernel treated separately in Linux? [closed] https://askubuntu.com/questions/913351/ * Making a PDF document http://askubuntu.com/questions/914457/ ==== Top Voted New Questions ==== * What is the "Wanna Cry" ransomware's possible impact on Linux users? https://askubuntu.com/questions/914623/ * What are the default text editors in different flavours of Ubuntu? http://askubuntu.com/questions/913609/ * How can I know from which partition I had booted? http://askubuntu.com/questions/913706/ * Why are the operating system and kernel treated separately in Linux? http://askubuntu.com/questions/913351/ * Does someone other than Canonical provide paid support for Ubuntu? http://askubuntu.com/questions/914135/ Ask (and answer!) questions at http://askubuntu.com == LoCo Events == The following LoCo team events are currently scheduled in the next two weeks: * Hora Ubuntu Lisboa, Ubuntu Portugal: http://loco.ubuntu.com/events/ubuntu-pt/3566-hora-ubuntu-lisboa/ * Ubuntu Party, LoCoTeam ubuntu-fr: http://loco.ubuntu.com/events/ubuntu-fr/3537-ubuntu-party/ * AZLOCO Install-fest/Linux Workshop, Arizona LoCo Team: http://loco.ubuntu.com/events/ubuntu-arizona/ * Sierra Vista Ubuntu Hour, Arizona LoCo Team: http://loco.ubuntu.com/events/ubuntu-arizona/3532-sierr * Tempe Ubuntu Hour, Arizona LoCo Team: http://loco.ubuntu.com/events/ubuntu-arizona/3533-tempe-ubuntu * Cultura Libre Para un mundo libre, Ubuntu Venezuela Team: http://loco.ubuntu.com/events/ubuntu-ve/3549 * Ubuntu Korea Community Monthly Seminar (May, 2017), Ubuntu Korean Team: http://loco.ubuntu.com/events/ * Ubuntu Hour Athens, Ubuntu Greece: http://loco.ubuntu.com/events/ubuntu-gr/3558-ubuntu-hour-athens/ Looking beyond the next two weeks? Visit the LoCo Team Portal to browse upcoming events around the world: http://loco.ubuntu.com/events/ == The Planet == === Kubuntu: 17.10 Wallpaper Contest! Call for artists === Kubuntu have their first wallpaper contest for the 17.10 Artful Aardvark release, and it's open to any user. Submissions are to be made by flickr and full details provided, with a June 8 2017 deadline. http://www.kubuntu.org/news/17-10-wallpaper-contest-call-for-artists/ === Valorie Zimmerman: Google Summer of Code students are announced today === Valorie Zimmerman tell us that the Google Summer of Code students have been announced and informs us what the students be working on. The coding period starts May 30, with Valorie asking us to look out for student blogs and posts, and welcome and aid them during this community bonding period. http://linuxgrandma.blogspot.com/2017/05/google-summer-of-code-students-are.html === Canonical Design Team: April's reading list === Inayaili de Leon of Canonical provides with the best links shared by the design team in April 2017. Inayaili also thanks Ant, Barry, Carla & Richard for the links. https://design.canonical.com/2017/05/aprils-reading-list-2/ === Marcos Costales: A new hope for Ubuntu Phone: The community === Marcos Costales writes about Ubuntu Phone providing a link to instructions on how to open a new store on your Ubuntu Phone. This new openStore will continue after Canonical closes the original current store. Further Marcos tells us of a new 0.70 release uNav available in the new openStore. http://thinkonbytes.blogspot.com/2017/05/a-new-hope-for-ubuntu-phone-community.html === Aaron Honeycutt: LFNW 2017 === Aaron Honeycutt tells us about the recent LinuxFest NorthWest 2017. The Ubuntu was manned by Valorie (Kubuntu), Simon (Kubuntu/Lubuntu) with Martin Wimpress (Ubuntu-Mate) there too. Aaron provides photos and some details of what occurs, with thanks to the Ubuntu Community for helping make this happen. http://usefoss.com/index.php/2017/05/14/lfnw-2017/ == Other Community News == === Frameworks and plasma updates for backports === Jose Manuel Santamaria Lema asks that if you have a spare machine, or even vm, that you help test Plasma 5.9.5 and Frameworks 5.33 on Kubuntu 17.04. https://lists.ubuntu.com/archives/kubuntu-users/2017-May/062260.html == Canonical News == * Canonical's support for Kubernetes 1.6.2 release! - https://insights.ubuntu.com/2017/05/04/cdk-1-6-2-released/ * Discord is now available as a snap for Ubuntu and other distributions - https://insights.ubuntu.com/2017/05/04/discord-is-now-available-as-a-snap-for-ubuntu-and-other-distributions/ * Painless Kubernetes upgrades - https://pages.ubuntu.com/03.UpgradingK8sclusters_LPOn-demandwebinar.html * Canonical and NetApp collaborate to supply Open Cloud Solutions - https://insights.ubuntu.com/2017/05/04/canonical-and-netapp-collaborate-to-supply-open-cloud-solutions/ * Video: Managed OpenStack upgrades - https://insights.ubuntu.com/2017/05/08/video-managed-openstack-upgrades/ * Consortium GARR creates countrywide Federated Canonical OpenStack Cloud - https://insights.ubuntu.com/2017/05/09/consortium-garr-creates-countywide-federated-canonical-openstack-cloud/ * Canonical and Qualcomm: Delivering Unprecedented Scaling - https://insights.ubuntu.com/2017/05/09/canonical-and-qualcomm-delivering-unprecedented-scaling/ * Crowd funding the Radio access technology - https://insights.ubuntu.com/2017/05/10/crowd-funding-the-radio-access-technology/ * Why language choices can be irrelevant when choosing the right IoS OS - https://insights.ubuntu.com/2017/05/10/why-language-choices-can-be-irrelevant-when-choosing-the-right-iot-os/ * PCCW Global Chooses Ubuntu OpenStack and Juju - https://insights.ubuntu.com/2017/05/11/pccw-global-chooses-ubuntu-openstack-and-juju/ * Atom is now available as a snap for Ubuntu - https://insights.ubuntu.com/2017/05/11/atom-is-now-available-as-a-snap-for-ubuntu/ == In The Press == === Post Unity 8 Ubuntu shock? Relax, Linux has been here before === Scott Gilbertson of TheRegister writes following the recent events at Canonical, that it's not a first; other companies have done this before. Scott provides clues as to where he believes Canonical will be spending its efforts and his expected outcomes for Ubuntu. https://www.theregister.co.uk/2017/05/02/post_unity_8_what_next_for_canonical/ === Mark Shuttleworth: Ubuntu on the Desktop Will Remain Important to Canonical === Marius Nestor from Softpedia reports that Mark Shuttleworth commented that the Ubuntu Desktop is still one of the main products at Canonical. http://linux.softpedia.com/blog/mark-shuttleworth-ubuntu-on-the-desktop-will-remain-important-to-canonical-515529.shtml This announcement was covered by several sites, the following is another selected by our editors: * Mark Shuttleworth Says Ubuntu Desktops "Remains Really Important" - http://www.omgubuntu.co.uk/2017/05/mark-shuttleworth-on-state-of-ubuntu === Canonical starts IPO path === Steven J. Vaughan-Nichols from ZDNet writes about the OpenStack Summit interview of Mark Shuttleworth. The reason for Mark Shuttleworth's recent changes within Canonical is to prepare it for IPO, which is undated, but will be sooner rather than later. http://www.zdnet.com/article/canonical-starts-ipo-path/ === What happened at Canonical === Chris Thornett gives an in depth opinion piece on recent events within Canonical. From Canonical's U-turn on Unity, reducing staff numbers through to seeking external investors leading to an IPO in four years. Much detail including how it affected employees is provided because of leaks from employees. http://www.techradar.com/news/what-happened-at-canonical === Ubuntu 17.04 review: Don't call it abandonware, pre se === Scott Gilbertson from ArsTechinca gives a review on Ubuntu 17.04. He compares Ubuntu Desktop, shipping with Unity, with Ubuntu GNOME. https://arstechnica.com/gadgets/2017/05/ubuntu-17-04-review-this-is-unitys-true-swan-song/ === Ubuntu 17.10 Won't Ship with Upstart and CGManager As Unity 8 Is Being Dropped === Marius Nestor from Softpedia writes about Ubuntu 17.10, codenamed Artful Aardvark, which won't ship with Upstart and CGManager, key components to Unity 8. http://news.softpedia.com/news/ubuntu-17-10-won-t-ship-with-upstart-and-cgmanager-as-unity-8-is-being-dropped-515289.shtml === Hell Is Freezing Over, Part 2: Ubuntu Launched in Microsoft's Windows Store === Marius Nestor from Softpedia write about Ubuntu launching in the Microsoft Windows Store, which allows the operating system to be installed alongside Windows, as a painless solution. http://news.softpedia.com/news/hell-is-freezing-over-part-2-ubuntu-launched-in-microsoft-s-windows-store-515638.shtml This announcement was widely covered, the following is a selection by our editors: * https://blogs.msdn.microsoft.com/commandline/2017/05/11/new-distros-coming-to-bashwsl-via-windows-store/ * https://venturebeat.com/2017/05/11/ubuntu-arrives-in-the-windows-store-suse-and-fedora-are-coming-to-the-windows-subsystem-for-linux/ === Microsoft Announces Linux Subsystem for Windows Server === Bogdan Popa of Softpedia tells us that Microsoft have announced at Build this week, that Ubuntu, Fedora and SUSE are coming to the Windows Store. Further the Windows Subsystem for Linux is coming to Windows Server later in the year. http://news.softpedia.com/news/microsoft-announces-linux-subsystem-for-windows-server-515682.shtml == In The Blogosphere == === Meet the Slimbook Excalibur, a 15" Aluminum Linux Laptop === Joey Sneddon of OMG! Ubuntu tells us about the Slimbook from a Spanish computer company. Joey provides specs and some options available, including a choice of Ubuntu, KDE Neon or other OSes. Finally prices are listed with a note that prices are expected to rise May 25th. http://www.omgubuntu.co.uk/2017/05/slimbook-excalibur-linux-laptop-specs === The Dell Precision 5520 lets you get to work in Ubuntu 16.04 === Alex Campbell at PCWorld provides his review of the Dell Precision 5520 laptop shipping with Ubuntu. Alex outlines issues with arrival followed by fix, then moves to describing the laptop including specs, numerous benchmarks and many opinions and findings. http://www.pcworld.com/article/3190552/linux/the-dell-precision-5520-lets-you-get-to-work-in-ubuntu-16-04.html === Canonical Developer Works on Bringing Snap Support to Raspberry Pi's Raspbian === Marius Nestor of Softpedia informs us that Simon Fels of Canonical has announced that he's working on bringing the Snappy daemon to the Raspbian OS for Raspberry Pis. A brief intro to Snaps is provided, before moving to telling us about Raspbian, and Simon's desire to have testers test it. Details on adding Snapd to Raspbian system is provided. http://news.softpedia.com/news/canonical-developers-works-on-bringing-snap-support-to-raspberry-pi-s-raspbian-515370.shtml === Canonical Releases Snapd 2.26 Snappy Daemon with Tab-Completion Support in Snaps === Marius Nestor of Softpedia lets us know that the Snappy daemon now supports tab completion in snaps, a very requested feature among developers. http://news.softpedia.com/news/canonical-releases-snapd-2-26-snappy-daemon-with-tab-completion-support-in-snaps-515649.shtml === Chuwi LapBook 12.3 is a 2K Ubuntu Laptop for $329 === Joey Sneddon from OMG! Ubuntu! Writes about the lapbook that Chinese computer company Chuwi is planning to release. With impressive specs at an even more impressing price, this lapbook looks promising. http://www.omgubuntu.co.uk/2017/05/chuwi-lapbook-12-3-laptop-price-specs === Official Ubuntu T-Shirt for 'Zesty Zapus' Is Now Available to Buy === Joey Sneddon from OMG! Ubuntu! Reports that the 17.04 t-shirts with the Zesty Zapus design is now available to be bought from the Canonical store. http://www.omgubuntu.co.uk/2017/05/ubuntu-t-shirt-17-04-zesty-zapus === Canonical: 'rip up the rule book' for engineers === Rob Horgan from PCR Online writes about how Canonical experiencing with a new playbook on regards to company strategy. http://www.pcr-online.biz/news/read/canonical-rip-up-the-rule-book-for-engineers/039321 == Other Articles of Interest == * Updated Debian 8: 8.8 released - https://www.debian.org/News/2017/20170506 * Snap Wishlist - suggestions wanted! - https://forum.snapcraft.io/t/snap-wishlist-suggestions-wanted/567 == Featured Audio and Video == === Ubuntu Podcast from the UK LoCo: S10E09 - Elfin Moaning Wine === It's Season Ten Episode Nine of the Ubuntu Podcast! Alan Pope, Mark Johnson, Martin Wimpress and Joey Sneddon are connected and speaking to your brain. http://ubuntupodcast.org/2017/05/04/s10e09-elfin-moaning-wine/ === Ubuntu Testing Day - Xubuntu === Leo Arias of Ubuntu QA hosts another Ubuntu Testing Day. This testing day features Sean Davis from the Xubuntu team. They talk about how you can test Xubuntu, and much more! === Ubuntu Testing Day - Kubuntu === Leo Arias hosts another Testing Day session, and is joined by Kyle Fazzari and Zygmunt Krynicki. This testing day features Aaron Honeycutt from the Kubuntu team. They talk about how you can test Kubuntu, and much more! === Ubuntu Podcast from the UK LoCo: S10E10 - Miniature Blushing Steel === It's Season Ten Episode Nine of the Ubuntu Podcast! Alan Pope, Mark Johnson, Martin Wimpress and Joey Sneddon are connected and speaking to your brain. http://ubuntupodcast.org/2017/05/11/s10e10-miniature-blushing-steel/ === Ubuntu Testing Day - Kubuntu === Leo Arias hosts an Ubuntu Testing Day with all things around Kubuntu QA. == Weekly Ubuntu Development Team Meetings == * Security Team - May 9, 2017 https://wiki.ubuntu.com/MeetingLogs/Security/20170509 * Server Team - May 9, 2017 https://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-05-09-16.03.html == Upcoming Meetings and Events == For upcoming meetings and events please visit the calendars at fridge.ubuntu.com: http://fridge.ubuntu.com/calendars/ == Updates and Security for 14.04, 16.04, 16.10, and 17.04 == === Security Updates === * [uSN-3273-1] LibreOffice vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003834.html * [uSN-3274-1] ICU vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003835.html * [uSN-3276-1] shadow vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003836.html * [uSN-3279-1] Apache HTTP Server vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003837.html * [uSN-3280-1] Apache Batik vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003838.html * [uSN-3281-1] Apache Fop vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003839.html * [uSN-3282-1] FreeType vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003840.html * [uSN-3283-1] rtmpdump vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003841.html * [uSN-3284-1] OpenVPN vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003842.html * [uSN-3275-1] OpenJDK 8 vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003843.html * [uSN-3260-2] Firefox regression - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003844.html * [uSN-3285-1] LightDM vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003845.html * [uSN-3286-1] KDE-Libs vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003846.html * [uSN-3287-1] Git vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003847.html * [uSN-3288-1] libytnef vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-May/003848.html === Ubuntu 14.04 Updates === * walinuxagent 2.2.9-0ubuntu1~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024084.html * linux-signed-lts-xenial 4.4.0-78.99~14.04.2 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024085.html * linux-lts-xenial 4.4.0-78.99~14.04.2 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024086.html * linux-meta-lts-xenial 4.4.0.78.63 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024087.html * linux-lts-xenial_4.4.0-78.99~14.04.2_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024088.html * libreoffice 1:4.2.8-0ubuntu5.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024089.html * icu 52.1-3ubuntu0.6 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024090.html * libreoffice 1:4.2.8-0ubuntu5.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024091.html * icu 52.1-3ubuntu0.6 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024092.html * bash 4.3-7ubuntu1.6 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024093.html * linux 3.13.0-119.166 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024094.html * linux-meta 3.13.0.119.129 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024095.html * linux-signed 3.13.0-119.166 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024096.html * linux_3.13.0-119.166_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024097.html * shadow 1:4.1.5.1-1ubuntu9.4 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024098.html * shadow 1:4.1.5.1-1ubuntu9.4 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024099.html * gce-compute-image-packages 20160930-0ubuntu6~14.04.0 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024100.html * binutils 2.24-5ubuntu14.2 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024101.html * binutils 2.24-5ubuntu14.2 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024102.html * activity-log-manager 0.9.7-0ubuntu14.2 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024103.html * chromium-browser 58.0.3029.96-0ubuntu0.14.04.1174 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024104.html * chromium-browser 58.0.3029.96-0ubuntu0.14.04.1174 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024105.html * unattended-upgrades 0.82.1ubuntu2.5 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024106.html * batik 1.7.ubuntu-8ubuntu2.14.04.2 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024107.html * fop 1:1.1.dfsg-2ubuntu1.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024108.html * freetype 2.5.2-1ubuntu2.8 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024109.html * rtmpdump 2.4+20121230.gitdf6c518-1ubuntu0.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024110.html * batik 1.7.ubuntu-8ubuntu2.14.04.2 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024111.html * fop 1:1.1.dfsg-2ubuntu1.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024112.html * freetype 2.5.2-1ubuntu2.8 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024113.html * rtmpdump 2.4+20121230.gitdf6c518-1ubuntu0.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024114.html * apache2 2.4.7-1ubuntu4.15 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024115.html * apache2 2.4.7-1ubuntu4.15 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024116.html * adobe-flashplugin 1:20170509.1-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024117.html * adobe-flashplugin 1:20170509.1-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024118.html * flashplugin-nonfree 25.0.0.171ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024119.html * flashplugin-nonfree 25.0.0.171ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024120.html * google-cloud-sdk 154.0.0-0ubuntu1~14.04.0 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024121.html * gce-compute-image-packages 20170426-0ubuntu1~14.04.0 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024122.html * sosreport 3.4-1~ubuntu14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024123.html * firefox 53.0.2+build1-0ubuntu0.14.04.2 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024124.html * firefox 53.0.2+build1-0ubuntu0.14.04.2 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024125.html * cloud-initramfs-tools 0.25ubuntu1.14.04.2 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024126.html * software-properties 0.92.37.8 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024127.html * gce-compute-image-packages 20170426-0ubuntu2~14.04.0 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024128.html * whoopsie 0.2.24.6ubuntu4 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024129.html * apport 2.14.1-0ubuntu3.24 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024130.html * xen 4.4.2-0ubuntu0.14.04.11 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024131.html * xen 4.4.2-0ubuntu0.14.04.11 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024132.html * kde4libs 4:4.13.3-0ubuntu0.5 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024133.html * git 1:1.9.1-1ubuntu0.5 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024134.html * git 1:1.9.1-1ubuntu0.5 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024135.html * kde4libs 4:4.13.3-0ubuntu0.5 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024136.html * libytnef 1.5-6ubuntu0.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024137.html * libytnef 1.5-6ubuntu0.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024138.html * isc-dhcp 4.2.4-7ubuntu12.9 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024139.html * openjdk-7 7u131-2.6.9-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024140.html * openjdk-7 7u131-2.6.9-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-May/024141.html End of Life - April 2019 === Ubuntu 16.04 Updates === * linux-signed 4.4.0-77.98 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016912.html * linux-meta 4.4.0.77.83 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016913.html * linux 4.4.0-77.98 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016914.html * linux-signed-hwe 4.8.0-51.54~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016915.html * linux-meta-hwe 4.8.0.51.22 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016916.html * linux-hwe 4.8.0-51.54~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016917.html * walinuxagent 2.2.9-0ubuntu1~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016918.html * linux-hwe_4.8.0-51.54~16.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016919.html * linux_4.4.0-77.98_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016920.html * linux-hwe 4.8.0-52.55~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016921.html * linux-signed-hwe 4.8.0-52.55~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016922.html * linux-meta-hwe 4.8.0.52.23 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016923.html * linux-hwe_4.8.0-52.55~16.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016924.html * linux-signed 4.4.0-78.99 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016925.html * linux 4.4.0-78.99 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016926.html * linux-meta 4.4.0.78.84 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016927.html * linux_4.4.0-78.99_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016928.html * linux-raspi2 4.4.0-1055.62 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016929.html * linux-meta-raspi2 4.4.0.1055.56 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016930.html * linux-snapdragon 4.4.0-1058.62 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016931.html * linux-meta-snapdragon 4.4.0.1058.51 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016932.html * linux-aws 4.4.0-1017.26 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016933.html * linux-meta-aws 4.4.0.1017.20 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016934.html * linux-gke 4.4.0-1013.13 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016935.html * linux-meta-gke 4.4.0.1013.15 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016936.html * libreoffice 1:5.1.6~rc2-0ubuntu1~xenial2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016937.html * icu 55.1-7ubuntu0.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016938.html * libreoffice 1:5.1.6~rc2-0ubuntu1~xenial2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016939.html * icu 55.1-7ubuntu0.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016940.html * linux-hwe-edge 4.10.0-21.23~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016941.html * linux-signed-hwe-edge 4.10.0-21.23~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016942.html * linux-meta-hwe-edge 4.10.0.21.14 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016943.html * linux-hwe-edge_4.10.0-21.23~16.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016944.html * qemu 1:2.5+dfsg-5ubuntu10.13 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016945.html * virtualbox 5.0.40-dfsg-0ubuntu1.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016946.html * virtualbox-ext-pack 5.0.40-0ubuntu1.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016947.html * virtualbox-guest-additions-iso 5.0.40-0ubuntu1.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016948.html * mtx 1.3.12-9ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016949.html * sssd 1.13.4-1ubuntu1.5 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016950.html * gdm3 3.18.3-0ubuntu2.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016951.html * gnome-software 3.20.1+git20170427.0.3d09239-0ubuntu1~xenial1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016952.html * nova 2:13.1.3-0ubuntu2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016953.html * neutron 2:8.4.0-0ubuntu2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016954.html * muon 4:5.6.0-0ubuntu1.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016955.html * sane-backends 1.0.25+git20150528-1ubuntu2.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016956.html * pcs 0.9.149-1ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016957.html * autopkgtest 3.20.4ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016958.html * linux-firmware 1.157.10 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016959.html * neutron-lbaas 2:8.3.0-0ubuntu3 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016960.html * shadow 1:4.2-3.1ubuntu5.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016961.html * shadow 1:4.2-3.1ubuntu5.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016962.html * kexec-tools 1:2.0.10-1ubuntu2.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016963.html * iproute2 4.3.0-1ubuntu3.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016964.html * google-perftools 2.4-0ubuntu5.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016965.html * keystone 2:9.3.0-0ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016966.html * activity-log-manager 0.9.7-0ubuntu23.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016967.html * unattended-upgrades 0.90ubuntu0.5 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016968.html * openssl 1.0.2g-1ubuntu4.7 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016969.html * nagios-nrpe 2.15-1ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016970.html * chromium-browser 58.0.3029.96-0ubuntu0.16.04.1279 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016971.html * chromium-browser 58.0.3029.96-0ubuntu0.16.04.1279 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016972.html * cloud-init 0.7.9-113-g513e99e0-0ubuntu1~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016973.html * horizon 2:9.1.2-0ubuntu1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016974.html * unattended-upgrades 0.90ubuntu0.6 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016975.html * software-properties 0.96.20.7 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016976.html * gce-compute-image-packages 20170426-0ubuntu1~16.04.0 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016977.html * ceph 10.2.7-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016978.html * apache2 2.4.18-2ubuntu3.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016979.html * apache2 2.4.18-2ubuntu3.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016980.html * freetype 2.6.1-0.1ubuntu2.3 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016981.html * rtmpdump 2.4+20151223.gitfa8646d-1ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016982.html * webkit2gtk 2.16.1-0ubuntu0.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016983.html * freetype 2.6.1-0.1ubuntu2.3 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016984.html * rtmpdump 2.4+20151223.gitfa8646d-1ubuntu0.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016985.html * adobe-flashplugin 1:20170509.1-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016986.html * adobe-flashplugin 1:20170509.1-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016987.html * flashplugin-nonfree 25.0.0.171ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016988.html * flashplugin-nonfree 25.0.0.171ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016989.html * google-cloud-sdk 154.0.0-0ubuntu1~16.04.0 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016990.html * sosreport 3.4-1~ubuntu16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016991.html * zlib 1:1.2.8.dfsg-2ubuntu4.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016992.html * vlc 2.2.2-5ubuntu0.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016993.html * opentk 1.1.4c+dfsg-2ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016994.html * logrotate 3.8.7-2ubuntu2.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016995.html * openssh 1:7.2p2-4ubuntu2.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016996.html * virtualbox-guest-additions-iso 5.0.40-0ubuntu1.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016997.html * virtualbox-ext-pack 5.0.40-0ubuntu1.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016998.html * virtualbox 5.0.40-dfsg-0ubuntu1.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/016999.html * firefox 53.0.2+build1-0ubuntu0.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017000.html * firefox 53.0.2+build1-0ubuntu0.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017001.html * openjdk-8 8u131-b11-0ubuntu1.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017002.html * openjdk-8 8u131-b11-0ubuntu1.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017003.html * webkit2gtk 2.16.1-0ubuntu0.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017004.html * libvirt 1.3.1-1ubuntu10.9 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017005.html * livecd-rootfs 2.408.12 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017006.html * xl2tpd 1.3.6+dfsg-4ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017007.html * cloud-initramfs-tools 0.27ubuntu1.4 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017008.html * tomcat8 8.0.32-1ubuntu1.4 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017009.html * php7.0 7.0.18-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017010.html * network-manager-applet 1.2.6-0ubuntu0.16.04.3 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017011.html * ding-libs 0.5.0-1ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017012.html * gce-compute-image-packages 20170426-0ubuntu2~16.04.0 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017013.html * qtbase-opensource-src 5.5.1+dfsg-16ubuntu7.5 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017014.html * whoopsie 0.2.52.3 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017015.html * x11proto-core 7.0.31-1~ubuntu16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017016.html * chrome-gnome-shell 9-0ubuntu1~ubuntu16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017017.html * apport 2.20.1-0ubuntu2.6 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017018.html * xen 4.6.5-0ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017019.html * xen 4.6.5-0ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017020.html * kde4libs 4:4.14.16-0ubuntu3.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017021.html * git 1:2.7.4-0ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017022.html * git 1:2.7.4-0ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017023.html * kde4libs 4:4.14.16-0ubuntu3.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017024.html * sphinx 1.3.6-2ubuntu1.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017025.html * strongswan 5.3.5-1ubuntu3.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017026.html * gdm3 3.18.3-0ubuntu2.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017027.html * neutron-lbaas 2:8.3.0-0ubuntu3 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017028.html * neutron 2:8.4.0-0ubuntu2 - https://lists.ubuntu.com/archives/xenial-changes/2017-May/017029.html End of Life - April 2021 === Ubuntu 16.10 Updates === * linux-signed 4.8.0-51.54 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012651.html * linux-meta 4.8.0.51.63 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012652.html * linux 4.8.0-51.54 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012653.html * walinuxagent 2.2.9-0ubuntu1~16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012654.html * linux-signed 4.8.0-52.55 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012655.html * linux 4.8.0-52.55 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012656.html * linux-meta 4.8.0.52.64 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012657.html * linux_4.8.0-52.55_amd64.tar.gz - - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012658.html * linux_4.8.0-51.54_amd64.tar.gz - - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012659.html * linux-raspi2 4.8.0-1036.39 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012660.html * linux-meta-raspi2 4.8.0.1036.40 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012661.html * libreoffice 1:5.2.2-0ubuntu2.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012662.html * icu 57.1-4ubuntu0.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012663.html * libreoffice 1:5.2.2-0ubuntu2.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012664.html * icu 57.1-4ubuntu0.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012665.html * linux-snapdragon 4.4.0-1058.62 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012666.html * linux-meta-snapdragon 4.4.0.1058.51 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012667.html * software-properties 0.96.24.7.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012668.html * mtx 1.3.12-9ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012669.html * sssd 1.13.4-3ubuntu0.4 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012670.html * gdm3 3.20.1-1ubuntu2.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012671.html * openssl 1.0.2g-1ubuntu9.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012672.html * gnome-software 3.20.1+git20170427.0.3d09239-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012673.html * php7.0 7.0.18-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012674.html * muon 4:5.6.0-0ubuntu1.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012675.html * vlc 2.2.4-4ubuntu0.16.10.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012676.html * nova-lxd 14.2.2-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012677.html * sane-backends 1.0.25+git20150528-1ubuntu2.16.10.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012678.html * neutron 2:9.2.0-0ubuntu2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012679.html * shadow 1:4.2-3.2ubuntu1.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012680.html * shadow 1:4.2-3.2ubuntu1.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012681.html * iproute2 4.3.0-1ubuntu3.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012682.html * neutron-lbaas 2:9.0.0-0ubuntu2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012683.html * google-perftools 2.4-0ubuntu5.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012684.html * activity-log-manager 0.9.7-0ubuntu23.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012685.html * unattended-upgrades 0.92ubuntu1.4 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012686.html * nagios-nrpe 2.15-1ubuntu3 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012687.html * chromium-browser 58.0.3029.96-0ubuntu0.16.10.1347 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012688.html * chromium-browser 58.0.3029.96-0ubuntu0.16.10.1347 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012689.html * unattended-upgrades 0.92ubuntu1.5 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012690.html * gce-compute-image-packages 20170426-0ubuntu1~16.10.0 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012691.html * ceph 10.2.7-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012692.html * dpdk 16.07.2-0ubuntu0.16.10.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012693.html * apache2 2.4.18-2ubuntu4.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012694.html * apache2 2.4.18-2ubuntu4.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012695.html * freetype 2.6.3-3ubuntu1.3 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012696.html * webkit2gtk 2.16.1-0ubuntu0.16.10.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012697.html * freetype 2.6.3-3ubuntu1.3 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012698.html * adobe-flashplugin 1:20170509.1-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012699.html * adobe-flashplugin 1:20170509.1-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012700.html * flashplugin-nonfree 25.0.0.171ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012701.html * flashplugin-nonfree 25.0.0.171ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012702.html * google-cloud-sdk 154.0.0-0ubuntu1~16.10.0 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012703.html * sosreport 3.4-1~ubuntu16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012704.html * zlib 1:1.2.8.dfsg-2ubuntu5.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012705.html * openssh 1:7.3p1-1ubuntu0.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012706.html * nagios-plugins-contrib 16.20151226ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012707.html * update-manager 1:16.10.10 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012708.html * firefox 53.0.2+build1-0ubuntu0.16.10.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012709.html * firefox 53.0.2+build1-0ubuntu0.16.10.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012710.html * openjdk-8 8u131-b11-0ubuntu1.16.10.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012711.html * openjdk-8 8u131-b11-0ubuntu1.16.10.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012712.html * webkit2gtk 2.16.1-0ubuntu0.16.10.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012713.html * libvirt 2.1.0-1ubuntu9.5 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012714.html * livecd-rootfs 2.435.3 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012715.html * xl2tpd 1.3.6+dfsg-4ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012716.html * cloud-init 0.7.9-113-g513e99e0-0ubuntu1~16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012717.html * aodh 3.0.2-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012718.html * cloud-initramfs-tools 0.30ubuntu1.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012719.html * ceilometer 1:7.0.3-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012720.html * cinder 2:9.1.4-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012722.html * horizon 3:10.0.3-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012721.html * heat 1:7.0.3-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012723.html * tomcat8 8.0.37-1ubuntu0.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012724.html * neutron-fwaas 1:9.0.1-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012725.html * lightdm 1.19.5-0ubuntu1.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012726.html * lightdm 1.19.5-0ubuntu1.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012727.html * gce-compute-image-packages 20170426-0ubuntu2~16.10.0 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012728.html * apport 2.20.3-0ubuntu8.3 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012729.html * whoopsie 0.2.54.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012730.html * chrome-gnome-shell 9-0ubuntu1~ubuntu16.10 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012731.html * xen 4.7.2-0ubuntu1.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012732.html * xen 4.7.2-0ubuntu1.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012733.html * kde4libs 4:4.14.22-0ubuntu2.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012734.html * git 1:2.9.3-1ubuntu0.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012735.html * kde4libs 4:4.14.22-0ubuntu2.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012736.html * git 1:2.9.3-1ubuntu0.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012737.html * sphinx 1.4.8-1ubuntu0.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012738.html * strongswan 5.3.5-1ubuntu4.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012739.html * gdm3 3.20.1-1ubuntu2.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012740.html * nova 2:14.0.5-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012741.html * neutron 2:9.2.0-0ubuntu2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012742.html * neutron-lbaas 2:9.0.0-0ubuntu2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-May/012743.html End of Life - July 2017 === Ubuntu 17.04 Updates === * wireguard 0.0.20170214-1ubuntu0.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010556.html * wireguard 0.0.20170214-1ubuntu0.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010557.html * linux 4.10.0-21.23 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010558.html * linux-signed 4.10.0-21.23 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010559.html * linux-meta 4.10.0.21.23 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010560.html * linux_4.10.0-21.23_amd64.tar.gz - - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010561.html * linux-raspi2 4.10.0-1005.7 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010562.html * linux-meta-raspi2 4.10.0.1005.7 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010563.html * walinuxagent 2.2.9-0ubuntu1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010564.html * icu 57.1-5ubuntu0.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010565.html * icu 57.1-5ubuntu0.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010566.html * linux-snapdragon 4.4.0-1058.62 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010567.html * linux-meta-snapdragon 4.4.0.1058.51 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010568.html * gnome-settings-daemon 3.24.1-0ubuntu1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010569.html * gnome-control-center 1:3.24.1-0ubuntu1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010570.html * gnome-desktop3 3.24.1-0ubuntu1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010571.html * gnome-shell 3.24.1-0ubuntu1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010572.html * gnome-shell-extension-autohidetopbar 20161203-1ubuntu1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010573.html * gjs 1.48.2-0ubuntu0.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010574.html * gnome-photos 3.24.1-0ubuntu1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010575.html * mutter 3.24.1-0ubuntu1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010576.html * ubuntu-mate-welcome 17.04.12 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010577.html * k3b 17.04.0-0ubuntu1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010578.html * caja 1.18.1-0ubuntu2 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010579.html * open-vm-tools 2:10.1.5-5055683-1ubuntu1.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010580.html * gdm3 3.24.1-0ubuntu0.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010581.html * nagios-nrpe 3.0.1-3ubuntu0.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010582.html * openssh 1:7.4p1-10ubuntu0.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010583.html * shadow 1:4.2-3.2ubuntu1.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010584.html * shadow 1:4.2-3.2ubuntu1.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010585.html * virtualbox 5.1.22-dfsg-0ubuntu1.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010586.html * virtualbox-ext-pack 5.1.22-2~17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010587.html * virtualbox-guest-additions-iso 5.1.22-1~17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010588.html * gnome-software 3.22.7-0ubuntu3.17.04.2 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010589.html * unattended-upgrades 0.93.1ubuntu2.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010590.html * openssl 1.0.2g-1ubuntu11.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010591.html * chromium-browser 58.0.3029.96-0ubuntu0.17.04.1352 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010592.html * chromium-browser 58.0.3029.96-0ubuntu0.17.04.1352 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010593.html * gnome-software 3.22.7-0ubuntu3.17.04.2 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010594.html * unattended-upgrades 0.93.1ubuntu2.2 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010595.html * gce-compute-image-packages 20170426-0ubuntu1~17.04.0 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010596.html * budgie-desktop 10.2.9-3ubuntu4.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010597.html * ceph 10.2.7-0ubuntu0.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010598.html * freetype 2.6.3-3ubuntu2.2 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010599.html * webkit2gtk 2.16.1-1ubuntu0.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010600.html * freetype 2.6.3-3ubuntu2.2 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010601.html * adobe-flashplugin 1:20170509.1-0ubuntu0.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010602.html * adobe-flashplugin 1:20170509.1-0ubuntu0.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010603.html * flashplugin-nonfree 25.0.0.171ubuntu0.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010604.html * flashplugin-nonfree 25.0.0.171ubuntu0.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010605.html * google-cloud-sdk 154.0.0-0ubuntu1~17.04.0 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010606.html * sosreport 3.4-1~ubuntu17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010607.html * linux-firmware 1.164.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010608.html * php7.0 7.0.18-0ubuntu0.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010609.html * gnome-calendar 3.24.1-0ubuntu0.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010610.html * firefox 53.0.2+build1-0ubuntu0.17.04.2 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010611.html * firefox 53.0.2+build1-0ubuntu0.17.04.2 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010612.html * openvpn 2.4.0-4ubuntu1.2 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010613.html * openjdk-8 8u131-b11-0ubuntu1.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010614.html * openjdk-8 8u131-b11-0ubuntu1.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010615.html * openvpn 2.4.0-4ubuntu1.2 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010616.html * webkit2gtk 2.16.1-1ubuntu0.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010617.html * libvirt 2.5.0-3ubuntu5.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010618.html * lomoco 1.0.0-2ubuntu0.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010619.html * livecd-rootfs 2.441.3 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010620.html * kauth 5.31.0-0ubuntu1.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010621.html * kde4libs 4:4.14.30-0ubuntu1.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010622.html * gnome-calendar 3.24.2-0ubuntu0.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010623.html * kauth 5.31.0-0ubuntu1.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010624.html * kde4libs 4:4.14.30-0ubuntu1.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010625.html * cloud-init 0.7.9-113-g513e99e0-0ubuntu1~17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010626.html * krb5 1.15-1ubuntu0.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010627.html * cloud-initramfs-tools 0.35ubuntu2 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010628.html * lightdm 1.22.0-0ubuntu2.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010629.html * lightdm 1.22.0-0ubuntu2.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010630.html * gce-compute-image-packages 20170426-0ubuntu2~17.04.0 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010631.html * btrfs-progs 4.9.1-1ubuntu1.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010632.html * apport 2.20.4-0ubuntu4.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010633.html * chrome-gnome-shell 9-0ubuntu1~ubuntu17.04 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010634.html * gjs 1.48.3-0ubuntu0.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010635.html * xen 4.8.0-1ubuntu2.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010636.html * xen 4.8.0-1ubuntu2.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010637.html * git 1:2.11.0-2ubuntu0.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010638.html * git 1:2.11.0-2ubuntu0.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010639.html * sphinx 1.5.3-1ubuntu0.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010640.html * gdm3 3.24.1-0ubuntu0.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010641.html * nagios-nrpe 3.0.1-3ubuntu0.17.04.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010642.html * neutron 2:10.0.0-0ubuntu5.1 - https://lists.ubuntu.com/archives/zesty-changes/2017-May/010643.html End of Life - January 2018 == Subscribe == Get your copy of the Ubuntu Weekly Newsletter delivered each week to you via email at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-news == Archives == You can always find older Ubuntu Weekly Newsletter issues at: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter == Additional Ubuntu News == As always you can find more news and announcements at: http://insights.ubuntu.com/ and http://fridge.ubuntu.com/ == Conclusion == Thank you for reading the Ubuntu Weekly Newsletter. See you next week! == Credits == The Ubuntu Weekly Newsletter is brought to you by: * Simon Quigley * Chris Guiver * Nathan Handler * Jose Antonio Rey * And many others == Glossary of Terms == Other acronyms can be found at https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/glossary == Ubuntu - Get Involved == The Ubuntu community consists of individuals and teams, working on different aspects of the distribution, giving advice and technical support, and helping to promote Ubuntu to a wider audience. No contribution is too small, and anyone can help. It's your chance to get in on all the community fun associated with developing and promoting Ubuntu. http://community.ubuntu.com/contribute/ Or get involved with the Ubuntu Weekly Newsletter team! We always need summary writers and editors, if you're interested, learn more at: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/Join == Feedback == This document is maintained by the Ubuntu Weekly News Team. If you have a story idea or suggestions for the Weekly Newsletter, join the Ubuntu
-
View this email in your browser (http://mailchi.mp/ab666df7a800/crucial-ballistix-elite-ddr4-3466-memory-review?e=8138df6da5) ** Benchmark Reviews Presents: ------------------------------------------------------------ TITLE: Crucial Ballistix Elite DDR4-3466 Memory Review (http://benchmarkreviews.us10.list-manage1.com/track/click?u=9a2f239b17114c9008e3dfda9&id=948cff3cc5&e=8138df6da5) QUOTE: We’re in the middle of a transition from the DDR3 memory standard that has served us well for a decade to the new DDR4 standard. With higher bandwidth at lower voltage, DDR4 seems a perfect match for our compute-intensive multi-core CPU world. In this article Benchmark Reviews examines Crucial’s Ballistix Elite DDR4 enthusiast memory, which runs at an eye-watering 3466Mhz. We’ll test it against “standard†DDR4 to see what difference this extra performance makes. LINK: http://benchmarkreviews.us10.list-manage1.com/track/click?u=9a2f239b17114c9008e3dfda9&id=5de4fdccb2&e=8138df6da5 IMAGE: http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=75e4bd21d1&e=8138df6da5 ============================================================ ** (http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=99086d5405&e=8138df6da5) ** (http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=bc52b31fbb&e=8138df6da5) ** (http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=813b077596&e=8138df6da5)
-
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Biostar Z270GT8 Link: https://www.techpowerup.com/reviews/Biostar/Z270GT8 Brief: Biostar's Z270GT8, is more than just a full-sized version of the Z270GT4 which we looked at earlier. It includes everything the Z270GT4 board did, but adds in Intel Optane functionality and a few other things. The Biostar Z270GT8 is a big departure from past Biostar products, and this isn't your everyday entry-level board.
-
TITLE: Corsair Glaive RGB Review ( -at -) Vortez CONTENT: The high performance PC components and peripheral manufacturer, Corsair, has released the Glaive RGB, a mouse aimed heavily towards the FPS gamer looking for comfort and performance. Featuring a custom PixArt 16,000 DPI sensor, a trio of interchangeable magnetic thumb grips, OMRON switches and 3-Zone RGB, the Glaive certainly promises a lot. LINK: https://www.vortez.net/review.php?id=1302 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
-
SUSE Security Update: Security update for Linux Kernel Live Patch 0 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1303-1 Rating: important References: #1030575 #1031440 #1031481 #1031660 Cross-References: CVE-2017-7294 CVE-2017-7308 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: This update for the Linux Kernel 4.4.21-69 fixes several issues. The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1030575, bsc#1031660). - CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bsc#1031440, bsc#1031481). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-784=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_21-69-default-6-17.2 References: https://www.suse.com/security/cve/CVE-2017-7294.html https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031440 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
MSI GT62VR 7RE Dominator Pro (i7-7820HQ/ GTX 1070/ 4K) ------------------------------------------------------------ http://mailchi.mp/kitguru/msi-gt62vr-7re-dominator-pro-i7-7820hq-gtx-1070-4k?e=872093acb5 http://www.kitguru.net MSI GT62VR 7RE Dominator Pro (i7-7820HQ/ GTX 1070/ 4K) Today we look at the MSI GT62VR 7RE Dominator Pro which features an Ultra HD 4k panel, Core i7 7820HK processor, 512GB SSD and 8GB Nvidia GTX 1070 graphics. We know the GTX 1070 will struggle to get playable frame rates at 4k resolution, but is the UHD panel worth having for media and design demands? Read the review here: http://www.kitguru.net/lifestyle/mobile/laptops/dale-shaughnessy/msi-gt62vr-7re-dominator-pro-i7-7820hq-gtx-1070-4k/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend1.com/forward?u=bfb2b902b5fb045ad6f841f98&id=4739bc72ee&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
SUSE Security Update: Security update for Linux Kernel Live Patch 20 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1281-1 Rating: important References: #1025013 #1030575 #1031660 Cross-References: CVE-2017-5970 CVE-2017-7308 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves two vulnerabilities and has one errata is now available. Description: This update the for Linux Kernel 3.12.61-52.69 fixes one issue. The following security bug was fixed: - CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bsc#1025013). - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1030575, bsc#1031660). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-763=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-763=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_61-52_69-default-2-4.1 kgraft-patch-3_12_61-52_69-xen-2-4.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_61-52_69-default-2-4.1 kgraft-patch-3_12_61-52_69-xen-2-4.1 References: https://www.suse.com/security/cve/CVE-2017-5970.html https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1025013 https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 5 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1283-1 Rating: important References: #1030575 #1031440 #1031481 #1031660 Cross-References: CVE-2017-7294 CVE-2017-7308 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: This update for the Linux Kernel 4.4.49-92_11 fixes several issues. The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1030575, bsc#1031660). - CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bsc#1031440, bsc#1031481). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-769=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_49-92_11-default-3-2.1 References: https://www.suse.com/security/cve/CVE-2017-7294.html https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031440 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 18 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1287-1 Rating: important References: #1030575 #1031660 Cross-References: CVE-2017-7308 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for the Linux Kernel 3.12.60-52_63 fixes several issues. The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1030575, bsc#1031660). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-765=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-765=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_60-52_63-default-5-2.1 kgraft-patch-3_12_60-52_63-xen-5-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_60-52_63-default-5-2.1 kgraft-patch-3_12_60-52_63-xen-5-2.1 References: https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 11 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1290-1 Rating: important References: #1030575 #1031440 #1031481 #1031660 Cross-References: CVE-2017-7294 CVE-2017-7308 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: This update for the Linux Kernel 3.12.67-60_64_24 fixes several issues. The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1031660). - CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bsc#1031440, bsc#1031481). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-775=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_67-60_64_24-default-5-2.1 kgraft-patch-3_12_67-60_64_24-xen-5-2.1 References: https://www.suse.com/security/cve/CVE-2017-7294.html https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031440 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 16 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1291-1 Rating: important References: #1030575 #1031660 Cross-References: CVE-2017-7308 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that solves one vulnerability and has one errata is now available. Description: This update for the Linux Kernel 3.12.60-52_57 fixes several issues. The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1030575, bsc#1031660). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-767=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-767=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_60-52_57-default-6-2.1 kgraft-patch-3_12_60-52_57-xen-6-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_60-52_57-default-6-2.1 kgraft-patch-3_12_60-52_57-xen-6-2.1 References: https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 4 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1295-1 Rating: important References: #1030575 #1031440 #1031481 #1031660 Cross-References: CVE-2017-7294 CVE-2017-7308 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: This update for the Linux Kernel 4.4.38-93 fixes several issues. The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1030575, bsc#1031660). - CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bsc#1031440, bsc#1031481). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-770=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_38-93-default-5-2.1 References: https://www.suse.com/security/cve/CVE-2017-7294.html https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031440 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 10 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1289-1 Rating: important References: #1030575 #1031440 #1031481 #1031660 Cross-References: CVE-2017-7294 CVE-2017-7308 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that solves two vulnerabilities and has two fixes is now available. Description: This update for the Linux Kernel 3.12.67-60_64_21 fixes several issues. The following security bugs were fixed: - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bsc#1031660). - CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bsc#1031440, bsc#1031481). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-776=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_67-60_64_21-default-6-2.1 kgraft-patch-3_12_67-60_64_21-xen-6-2.1 References: https://www.suse.com/security/cve/CVE-2017-7294.html https://www.suse.com/security/cve/CVE-2017-7308.html https://bugzilla.suse.com/1030575 https://bugzilla.suse.com/1031440 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1031660 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org