news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
Lenovo IdeaCentre Y710 Cube Review: Big Gaming Performance In A Small Package
news posted a topic in Upcoming News
View this email in your browser (http://mailchi.mp/hothardware/intel-optane-memory-with-3d-xpoint-review-easy-robust-pc-acceleration-1082757?e=0c004f9c13) The Lenovo IdeaCentre Y710 Cube is a small form factor (SFF) PC aimed at hardcore gamers on the go. The toolbox-size computer packs solid desktop hardware, including an Intel Core i7-6700 processor and an NVIDIA GeForce GTX 1070 GPU, giving it the horsepower necessary to handle most modern games. And, like a toolbox, the Y710 Cube has a handle so you can grab it and go. Compact PCs have become increasingly more popular with gamers who want the power of a desktop system, but don’t want to lug a large PC when the need arises. They’re also popular at LAN events, for the same reasons... Lenovo IdeaCentre Y710 Cube Review: Big Gaming Performance In A Small Package (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=e6f6f7585f&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=4148a391f7&e=0c004f9c13 http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=fe41c3bb2a&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=354d74f26a&e=0c004f9c13) http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=87a9d50449&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=5eea4b117f&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=13679ade57&e=0c004f9c13 ============================================================ -
Corsair has added yet one more product to their ever growing gaming peripheral repertoire with their launch of the GLAIVE RGB Gaming Mouse. The GLAIVE RGB is not that big of a departure from their popular M65 PRO RGB gaming mouse. In fact, I happen to own one which I’ve been using for several months so it makes for a nice comparison. Read on to see how the new GLAIVE RGB performs! Article Title: Corsair GLAIVE RGB Gaming Mouse Review ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/corsair-glaive-rgb-gaming-mouse-review_194210 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// =
-
Patriot Hellfire PCIe M.2 Solid State Drive Review @ ThinkComputers.org
news posted a topic in Upcoming News
Patriot Hellfire PCIe M.2 Solid State Drive Review ( -at -) ThinkComputers.org Review Link: http://www.thinkcomputers.org/patriot-hellfire-pcie-m-2-solid-state-drive-review/ Image URL: http://www.thinkcomputers.org/reviews/patriot_hellfire/email.jpg Alt Image URL: http://www.thinkcomputers.org/reviews/patriot_hellfire/small.jpg Quote: "Over the past year we've seen a new generation of solid state drives enter the market taking speeds and form factor to the next level.  These are of course the PCI-Express M.2 NVMe (Non-Volatile Memory Express) drives.  These drives offer 3-4x the speeds of SATA-based solid state drives and are extremely small, plugging right into an M.2 slot in your motherboard.  Patriot has presented us with their first ever PCI-Express M.2 solid state drive, the Hellfire.  It is based off of Phison's E7 NVMe controller and comes in 240GB and 480GB versions.  Today we have the 480GB version which offers sequential read and write speeds of 3000 MB/s and 2400 MB/s respectively.  Let's see what this drive can do!" -
News: Aorus' GeForce GTX 1080 Ti Xtreme Edition 11G graphics card reviewed
news posted a topic in Upcoming News
Aorus' GeForce GTX 1080 Ti Xtreme Edition 11G promises to unshackle the GP102 GPU from the constraints of a reference board. We run this card through our gauntlet of performance and noise testing to see whether it's worth the premium over Nvidia's GeForce GTX 1080 Ti Founders Edition. Read more: http://techreport.com/review/31763/aorus-geforce-gtx-1080-ti-xtreme-edition-11g-graphics-card-reviewed --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser. -
Fibaro Home Center Lite Z-Wave Smart Home Controller Review @ Bigbruin.com
news posted a topic in Upcoming News
Bigbruin.com has published new content which might be of interest to your readers. A post on your site regarding this announcement would be greatly appreciated. *Title:* Fibaro Home Center Lite Z-Wave Smart Home Controller *Link: *https://bigbruin.com/content/fibaro-hcl_1 *Image (250x250):*https://bigbruin.com/images/articles/948/promo_4.jpg* * ** *Quote:* * * The Fibaro Home Center Lite Z-Wave smart home controller is a powerful device able to manage up to 230 Z-Wave devices with impressively fast local processing. The setup is quick and easy, and within minutes the unit is ready for you to start adding devices and configuring scenes. It is a very feature packed controller, so you have more advanced control over how your devices are setup, used, and associated with other features of your smart home. Best regards, Jason www.bigbruin.com <http://www.bigbruin.com/> -- -
Overclockers UK Titan Katana System (Ryzen 1700, GTX 1070) ------------------------------------------------------------ http://mailchi.mp/kitguru/overclockers-uk-titan-katana-system-ryzen-1700-gtx-1070?e=872093acb5 http://www.kitguru.net Overclockers UK Titan Katana System (Ryzen 1700, GTX 1070) When Overclockers UK delivered their Titan Katana we practically clapped our hands with glee at the prospect of seeing another AMD Ryzen gaming PC. To our way of thinking, anything that stimulates competition and drives down prices is welcome and we love seeing AMD Ryzen take the fight to Intel Core i7. It made us even happier to see that Titan Katana combines the Ryzen 7 1700 CPU and GTX 1070 graphics card yet came with a price tag close to £1,300. That is the sort of price that puts the OCUK Titan Katana within reach of the mainstream gamer who doesn’t want to take out a mortgage to buy a new PC. Read the review here: http://www.kitguru.net/desktop-pc/leo-waldock/overclockers-uk-titan-katana-system-ryzen-1700-gtx-1070/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=53c0e1254e&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: bind security update Advisory ID: RHSA-2017:1202-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:1202 Issue date: 2017-05-08 CVE Names: CVE-2017-3139 ===================================================================== 1. Summary: An update for bind is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly. Security Fix(es): * A denial of service flaw was found in the way BIND handled DNSSEC validation. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2017-3139) Note: This issue affected only the BIND versions as shipped with Red Hat Enterprise Linux 6. This issue did not affect any upstream versions of BIND. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, the BIND daemon (named) will be restarted automatically. 5. Bugs fixed (https://bugzilla.redhat.com/): 1447743 - CVE-2017-3139 bind: assertion failure in DNSSEC validation 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: bind-9.8.2-0.62.rc1.el6_9.2.src.rpm i386: bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-utils-9.8.2-0.62.rc1.el6_9.2.i686.rpm x86_64: bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-utils-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: bind-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-chroot-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-sdb-9.8.2-0.62.rc1.el6_9.2.i686.rpm x86_64: bind-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-chroot-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-sdb-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: bind-9.8.2-0.62.rc1.el6_9.2.src.rpm x86_64: bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-utils-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: bind-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-chroot-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-sdb-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: bind-9.8.2-0.62.rc1.el6_9.2.src.rpm i386: bind-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-chroot-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-utils-9.8.2-0.62.rc1.el6_9.2.i686.rpm ppc64: bind-9.8.2-0.62.rc1.el6_9.2.ppc64.rpm bind-chroot-9.8.2-0.62.rc1.el6_9.2.ppc64.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.ppc.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.ppc64.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.ppc.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.ppc64.rpm bind-utils-9.8.2-0.62.rc1.el6_9.2.ppc64.rpm s390x: bind-9.8.2-0.62.rc1.el6_9.2.s390x.rpm bind-chroot-9.8.2-0.62.rc1.el6_9.2.s390x.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.s390.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.s390x.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.s390.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.s390x.rpm bind-utils-9.8.2-0.62.rc1.el6_9.2.s390x.rpm x86_64: bind-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-chroot-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-utils-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-sdb-9.8.2-0.62.rc1.el6_9.2.i686.rpm ppc64: bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.ppc.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.ppc64.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.ppc.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.ppc64.rpm bind-sdb-9.8.2-0.62.rc1.el6_9.2.ppc64.rpm s390x: bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.s390.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.s390x.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.s390.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.s390x.rpm bind-sdb-9.8.2-0.62.rc1.el6_9.2.s390x.rpm x86_64: bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-sdb-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: bind-9.8.2-0.62.rc1.el6_9.2.src.rpm i386: bind-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-chroot-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-utils-9.8.2-0.62.rc1.el6_9.2.i686.rpm x86_64: bind-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-chroot-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-libs-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-utils-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-sdb-9.8.2-0.62.rc1.el6_9.2.i686.rpm x86_64: bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-debuginfo-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.i686.rpm bind-devel-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm bind-sdb-9.8.2-0.62.rc1.el6_9.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-3139 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFZEEIDXlSAg2UNWIIRArrXAJ0a+4zX46HMCKfkn70RNdc0b0oblwCfYqD6 25eyw049SIjfO97unZnepmY= =21Kp -----END PGP SIGNATURE----- --
-
** be quiet! Pure Rock Slim Cooler Review ------------------------------------------------------------ ------------------------------------------------------------ http://mailchi.mp/kitguru/be-quiet-pure-rock-slim-cooler-review?e=872093acb5 http://www.kitguru.net ** be quiet! Pure Rock Slim Cooler Review ------------------------------------------------------------ When you think of be quiet! air coolers, you probably think of their massive coolers, such as the Dark Rock or Dark Rock Pro. The Pure Rock Slim is a different beast entirely, though, as it is a minuscule air cooler that boasts just 3 heatpipes and a 92mm fan. Is there a market for something like this? Read the review here: http://www.kitguru.net/components/cooling/dominic-moass/be-quiet-pure-rock-slim-cooler-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=110b1fbae1&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
** be quiet! Pure Rock Slim Cooler Review ------------------------------------------------------------ ------------------------------------------------------------ http://mailchi.mp/kitguru/be-quiet-pure-rock-slim-cooler-review?e=872093acb5 http://www.kitguru.net ** be quiet! Pure Rock Slim Cooler Review ------------------------------------------------------------ When you think of be quiet! air coolers, you probably think of their massive coolers, such as the Dark Rock or Dark Rock Pro. The Pure Rock Slim is a different beast entirely, though, as it is a minuscule air cooler that boasts just 3 heatpipes and a 92mm fan. Is there a market for something like this? Read the review here: http://www.kitguru.net/components/cooling/dominic-moass/be-quiet-pure-rock-slim-cooler-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=110b1fbae1&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
** TECHSPOT ------------------------------------------------------------ ** The Best PC Speakers ------------------------------------------------------------ ** http://www.techspot.com/bestof/speakers/ ------------------------------------------------------------ A good audio setup is essential when it comes to fully experiencing music, movies, and games on a PC. We’ve done the dirty work of researching various PC speakers to bring the best options in three categories: best studio speakers, best 2.1 speakers, and best budget speakers. Thank you. Julio Franco Executive Editor | TECHSPOT (http://www.techspot.com) ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
-
A news post would be great. OCC has published a review on Galactic Civilizations III: Crusade Here is a quote from the review: Quote: â€ÂCrusade changes Galactic Civilizations III a lot and I do not doubt that some of the changes some players will hate and others will love. That is kind of the nature of producing any kind of media. Personally, I like the changes that have been made, but I think I will also say I kind of wish certain elements could be toggled on and off. That is not an easy request to satisfy, to say the least, as some systems are connected in ways that changing one requires changing them all. (The change to adding modules to star bases is one easy example, as returning to the original system would need to disrupt the economy for constructors and the resources that are now needed to build the modules.) I doubt we will ever see that happen, but what Crusade offers is good and I look forward to playing more matches in it, developing new habits, and conquering some galaxies. I think I can safely recommend it, but you do need to understand it changes the game a lot and more than I have described. I have only covered the points that stuck out the most to me.†Title: Galactic Civilizations III: Crusade Review Link: http://www.overclockersclub.com/reviews/galciv3_crusade_review/ Img: http://www.overclockersclub.com/siteimages/articles/galciv3_crusade_review/003_thumb.jpg
-
openSUSE Security Update: Security update for Chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1194-1 Rating: important References: #1037594 Cross-References: CVE-2017-5068 Affected Products: SUSE Package Hub for SUSE Linux Enterprise 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update to Chromium 58.0.3029.96 fixes one security issue: - CVE-2017-5068: race condition in WebRTC (bsc#1037594) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Package Hub for SUSE Linux Enterprise 12: zypper in -t patch openSUSE-2017-541=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Package Hub for SUSE Linux Enterprise 12 (x86_64): chromedriver-58.0.3029.96-17.1 chromium-58.0.3029.96-17.1 References: https://www.suse.com/security/cve/CVE-2017-5068.html https://bugzilla.suse.com/1037594 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
openSUSE Security Update: Security update for Chromium ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1190-1 Rating: important References: #1037594 Cross-References: CVE-2017-5068 Affected Products: openSUSE Leap 42.2 openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update to Chromium 58.0.3029.96 fixes one security issue: - CVE-2017-5068: race condition in WebRTC (bsc#1037594) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-541=1 - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-541=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (x86_64): chromedriver-58.0.3029.96-104.12.1 chromedriver-debuginfo-58.0.3029.96-104.12.1 chromium-58.0.3029.96-104.12.1 chromium-debuginfo-58.0.3029.96-104.12.1 chromium-debugsource-58.0.3029.96-104.12.1 - openSUSE Leap 42.1 (x86_64): chromedriver-58.0.3029.96-114.1 chromedriver-debuginfo-58.0.3029.96-114.1 chromium-58.0.3029.96-114.1 chromium-debuginfo-58.0.3029.96-114.1 chromium-debugsource-58.0.3029.96-114.1 References: https://www.suse.com/security/cve/CVE-2017-5068.html https://bugzilla.suse.com/1037594 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
Title: LaCie D2 Thunderbolt 3 10TB Professional Storage Drive Review ( -at -) NikKTech Description: Professionals and enterprise users looking to get their hands on the fastest and highest capacity single HDD external enclosure in the market today should really look no further than the D2 Thunderbolt 3 10TB Professional Storage Drive by LaCie. Article Link: http://www.nikktech.com/main/articles/peripherals/external-storage/external- hard-drives/7749-lacie-d2-thunderbolt-3-10tb-professional-storage-drive-revi ew Image Link: http://www.nikktech.com/main/images/pics/reviews/lacie/d2_thunderbolt_3_10tb /lacie_d2_thunderbolt_3_10tba.jpg A News Post Would Be Appreciated. Thanks In Advance. Sincerely Nik Kastrantas
-
<http://www.eteknix.com> Raijintek Thetis Tempered Glass Aluminium Chassis Review Raijintek is one of the coolest chassis makers out there today. Not only do they offer a great range of stylish and well-made products, but they continue to do so at incredible price points, making them very appealing to many system builders who want great products, but don't want to pay a fortune for them. The new Thetis takes what we know and love from their existing product ranges, and gives it some new life with the help of a pair of tempered glass side panel windows, and one of their new O-Type LED fans. What's most impressive is you get stunning aluminium construction, and all that tempered glass for just £86.99; a lot less than you'll pay for Phanteks, Lian-Li and more! URL - https://www.eteknix.com/raijintek-thetis-tempered-glass-aluminium-chassis-review/ --
-
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Zalman ZM-K650-WP Keyboard Link: https://www.techpowerup.com/reviews/Zalman/ZM-K650WP Brief: The Z-Machine K650WP from Zalman is a membrane keyboard that comes in at a price point where there is really no competition from branded mechanical keyboards. At the same time, it offers a waterproof design, dedicated volume-control buttons, and an internal aluminum plate for structural rigidity, making it great value for the money.
-
-------- EPICGEAR MORPHA X LASER/OPTICAL MOUSE REVIEW ( -at -) APH NETWORKS --------- Hello everyone! APH Networks has published a new review that your readers might enjoy. A post in your site's news section would be greatly appreciated! Don't forget to send your site news to us. As we promise to post your news articles on APH Networks periodically, we would certainly appreciate it if you do the same as well. Thank you for your support in advance! * Title: EpicGear MorphA X Laser/Optical Mouse Review ( -at -) APH Networks * Description: The EpicGear MorphA X is the most customizable mouse on the market today. * Link: http://aphnetworks.com/reviews/epicgear-morpha-x * Image: http://aphnetworks.com/review/epicgear-morpha-x/011.jpg Best Regards, Jonathan Kwan Editor-in-Chief APH Networks Inc. http://aphnetworks.com -- Unsubscribe from this newsletter: http://aphnetworks.com/newsletter/confirm/remove/c77c84bd425t5
-
MSI GeForce GTX 1080 Ti Gaming X 11G Review: Blazing-Fast And Custom Cooled
news posted a topic in Upcoming News
View this email in your browser (http://mailchi.mp/hothardware/intel-optane-memory-with-3d-xpoint-review-easy-robust-pc-acceleration-1082753?e=0c004f9c13) Custom variants of NVIDIA's mighty GeForce GTX 1080 Ti are finally available -- more so than the initial run of the stock clocked Founders Editions. As always, however, fortune favors the prudent buyer or simply those more recently flush with cash. In this custom 1080 Ti offering, MSI marries old form with new function. The MSI GeForce GTX 1080 Ti Gaming X 11G has just emerged from our gauntlet of a dozen benches with style and grace, but we have to admit, she looks darn familiar. While other company's are gambling with fancy new fan configurations, RGB lighting and complicated cooling systems, MSI is kicking it old school... MSI GeForce GTX 1080 Ti Gaming X 11G Review: Blazing-Fast And Custom Cooled (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=e2265daf6d&e=0c004f9c13) http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=d4d770d27c&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=1171b36a4f&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=4fcb353f1c&e=0c004f9c13) http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=a8f39f2db2&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=8646e9f377&e=0c004f9c13 http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=4bd1ca08e2&e=0c004f9c13 ============================================================ -
SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1183-1 Rating: important References: #1007959 #1007962 #1008842 #1010032 #1011913 #1012382 #1012910 #1013994 #1014136 #1015609 #1017461 #1017641 #1018263 #1018419 #1019163 #1019614 #1019618 #1020048 #1021762 #1022340 #1022785 #1023866 #1024015 #1025683 #1026024 #1026405 #1026462 #1026505 #1026509 #1026692 #1026722 #1027054 #1027066 #1027153 #1027179 #1027189 #1027190 #1027195 #1027273 #1027616 #1028017 #1028027 #1028041 #1028158 #1028217 #1028325 #1028415 #1028819 #1028895 #1029220 #1029514 #1029634 #1029986 #1030118 #1030213 #1031003 #1031052 #1031200 #1031206 #1031208 #1031440 #1031481 #1031579 #1031660 #1031662 #1031717 #1031831 #1032006 #1032673 #1032681 #897662 #951844 #968697 #969755 #970083 #977572 #977860 #978056 #980892 #981634 #982783 #987899 #988281 #991173 #998106 Cross-References: CVE-2016-10200 CVE-2016-2117 CVE-2016-9191 CVE-2017-2596 CVE-2017-2671 CVE-2017-6074 CVE-2017-6214 CVE-2017-6345 CVE-2017-6346 CVE-2017-6347 CVE-2017-6353 CVE-2017-7187 CVE-2017-7261 CVE-2017-7294 CVE-2017-7308 CVE-2017-7374 Affected Products: SUSE Linux Enterprise Workstation Extension 12-SP2 SUSE Linux Enterprise Software Development Kit 12-SP2 SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 SUSE Linux Enterprise Server 12-SP2 SUSE Linux Enterprise Live Patching 12 SUSE Linux Enterprise High Availability 12-SP2 SUSE Linux Enterprise Desktop 12-SP2 OpenStack Cloud Magnum Orchestration 7 ______________________________________________________________________________ An update that solves 16 vulnerabilities and has 69 fixes is now available. Description: The SUSE Linux Enterprise 12 SP2 kernel was updated to 4.4.58 to receive various security and bugfixes. Notable new/improved features: - Improved support for Hyper-V - Support for Matrox G200eH3 - Support for tcp_westwood The following security bugs were fixed: - CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel was too late in obtaining a certain lock and consequently could not ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003). - CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (overflow) or possibly have unspecified other impact via crafted system calls (bnc#1031579). - CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440). - CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052). - CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213). - CVE-2017-7374: Use-after-free vulnerability in fs/crypto/ in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely (bnc#1032006). - CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415). - CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190). - CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKET_FANOUT setsockopt system calls (bnc#1027189). - CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066). - CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722). - CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enables scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697). - CVE-2017-6347: The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel had incorrect expectations about skb data layout, which allowed local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission (bnc#1027179). - CVE-2016-9191: The cgroup offline implementation in the Linux kernel mishandled certain drain operations, which allowed local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application (bnc#1008842). - CVE-2017-2596: The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c in the Linux kernel improperly emulated the VMXON instruction, which allowed KVM L1 guest OS users to cause a denial of service (host OS memory consumption) by leveraging the mishandling of page references (bnc#1022785). - CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024). The following non-security bugs were fixed: - ACPI, ioapic: Clear on-stack resource before using it (bsc#1028819). - ACPI: Do not create a platform_device for IOAPIC/IOxAPIC (bsc#1028819). - ACPI: Remove platform devices from a bus on removal (bsc#1028819). - HID: usbhid: Quirk a AMI virtual mouse and keyboard with ALWAYS_POLL (bsc#1022340). - NFS: do not try to cross a mountpount when there isn't one there (bsc#1028041). - NFS: flush out dirty data on file fput() (bsc#1021762). - PCI: hv: Fix wslot_to_devfn() to fix warnings on device removal (bug#1028217). - PCI: hv: Use device serial number as PCI domain (bug#1028217). - RAID1: a new I/O barrier implementation to remove resync window (bsc#998106,bsc#1020048,bsc#982783). - RAID1: avoid unnecessary spin locks in I/O barrier code (bsc#998106,bsc#1020048,bsc#982783). - Revert "RDMA/core: Fix incorrect structure packing for booleans" (kabi). - Revert "give up on gcc ilog2() constant optimizations" (kabi). - Revert "net/mlx4_en: Avoid unregister_netdev at shutdown flow" (bsc#1028017). - Revert "net: introduce device min_header_len" (kabi). - Revert "nfit, libnvdimm: fix interleave set cookie calculation" (kabi). - Revert "target: Fix NULL dereference during LUN lookup + active I/O shutdown" (kabi). - acpi, nfit: fix acpi_nfit_flush_probe() crash (bsc#1031717). - acpi, nfit: fix extended status translations for ACPI DSMs (bsc#1031717). - arm64: Use full path in KBUILD_IMAGE definition (bsc#1010032). - arm64: hugetlb: fix the wrong address for several functions (bsc#1032681). - arm64: hugetlb: fix the wrong return value for huge_ptep_set_access_flags (bsc#1032681). - arm64: hugetlb: remove the wrong pmd check in find_num_contig() (bsc#1032681). - arm: Use full path in KBUILD_IMAGE definition (bsc#1010032). - bnx2x: allow adding VLANs while interface is down (bsc#1027273). - bonding: fix 802.3ad aggregator reselection (bsc#1029514). - btrfs: Change qgroup_meta_rsv to 64bit (bsc#1019614). - btrfs: allow unlink to exceed subvolume quota (bsc#1019614). - btrfs: backref: Fix soft lockup in __merge_refs function (bsc#1017641). - btrfs: incremental send, do not delay rename when parent inode is new (bsc#1028325). - btrfs: incremental send, do not issue invalid rmdir operations (bsc#1028325). - btrfs: qgroup: Move half of the qgroup accounting time out of commit trans (bsc#1017461). - btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1019614). - btrfs: send, fix failure to rename top level inode due to name collision (bsc#1028325). - btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844 bsc#1024015) - cgroup/pids: remove spurious suspicious RCU usage warning (bnc#1031831). - crypto: algif_hash - avoid zero-sized array (bnc#1007962). - cxgb4vf: do not offload Rx checksums for IPv6 fragments (bsc#1026692). - device-dax: fix private mapping restriction, permit read-only (bsc#1031717). - drm/i915: Add intel_uncore_suspend / resume functions (bsc#1011913). - drm/i915: Fix crash after S3 resume with DP MST mode change (bsc#1029634). - drm/i915: Listen for PMIC bus access notifications (bsc#1011913). - drm/i915: Only enable hotplug interrupts if the display interrupts are enabled (bsc#1031717). - drm/mgag200: Added support for the new device G200eH3 (bsc#1007959) - ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986). - futex: Add missing error handling to FUTEX_REQUEUE_PI (bsc#969755). - futex: Fix potential use-after-free in FUTEX_REQUEUE_PI (bsc#969755). - hv: export current Hyper-V clocksource (bsc#1031206). - hv: util: do not forget to init host_ts.lock (bsc#1031206). - hv: vmbus: Prevent sending data on a rescinded channel (bug#1028217). - hv_utils: implement Hyper-V PTP source (bsc#1031206). - i2c-designware: increase timeout (bsc#1011913). - i2c: designware-baytrail: Acquire P-Unit access on bus acquire (bsc#1011913). - i2c: designware-baytrail: Call pmic_bus_access_notifier_chain (bsc#1011913). - i2c: designware-baytrail: Fix race when resetting the semaphore (bsc#1011913). - i2c: designware-baytrail: Only check iosf_mbi_available() for shared hosts (bsc#1011913). - i2c: designware: Disable pm for PMIC i2c-bus even if there is no _SEM method (bsc#1011913). - i2c: designware: Never suspend i2c-busses used for accessing the system PMIC (bsc#1011913). - i2c: designware: Rename accessor_flags to flags (bsc#1011913). - iommu/vt-d: Make sure IOMMUs are off when intel_iommu=off (bsc#1031208). - kABI: protect struct iscsi_conn (kabi). - kABI: protect struct se_node_acl (kabi). - kABI: restore can_rx_register parameters (kabi). - kgr/module: make a taint flag module-specific - kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662). - kgr: remove all arch-specific kgraft header files - l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415). - l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415). - l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind() (bsc#1028415). - l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv() (bsc#1028415). - l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415). - l2tp: lock socket before checking flags in connect() (bsc#1028415). - libnvdimm, pfn: fix memmap reservation size versus 4K alignment (bsc#1031717). - locking/semaphore: Add down_interruptible_timeout() (bsc#1031662). - md/raid1: Refactor raid1_make_request (bsc#998106,bsc#1020048,bsc#982783). - md/raid1: add rcu protection to rdev in fix_read_error (References: bsc#998106,bsc#1020048,bsc#982783). - md/raid1: fix a use-after-free bug (bsc#998106,bsc#1020048,bsc#982783). - md/raid1: handle flush request correctly (bsc#998106,bsc#1020048,bsc#982783). - mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118). - mm/memblock.c: fix memblock_next_valid_pfn() (bnc#1031200). - mm/page_alloc: Remove useless parameter of __free_pages_boot_core (bnc#1027195). - mm: fix set pageblock migratetype in deferred struct page init (bnc#1027195). - mm: page_alloc: skip over regions of invalid pfns where possible (bnc#1031200). - module: move add_taint_module() to a header file - net/ena: change condition for host attribute configuration (bsc#1026509). - net/ena: change driver's default timeouts (bsc#1026509). - net/ena: fix NULL dereference when removing the driver after device reset failed (bsc#1026509). - net/ena: fix RSS default hash configuration (bsc#1026509). - net/ena: fix ethtool RSS flow configuration (bsc#1026509). - net/ena: fix potential access to freed memory during device reset (bsc#1026509). - net/ena: fix queues number calculation (bsc#1026509). - net/ena: reduce the severity of ena printouts (bsc#1026509). - net/ena: refactor ena_get_stats64 to be atomic context safe (bsc#1026509). - net/ena: remove ntuple filter support from device feature list (bsc#1026509). - net/ena: update driver version to 1.1.2 (bsc#1026509). - net/ena: use READ_ONCE to access completion descriptors (bsc#1026509). - net/mlx4_core: Avoid command timeouts during VF driver device shutdown (bsc#1028017). - net/mlx4_core: Avoid delays during VF driver device shutdown (bsc#1028017). - net/mlx4_core: Fix racy CQ (Completion Queue) free (bsc#1028017). - net/mlx4_core: Fix when to save some qp context flags for dynamic VST to VGT transitions (bsc#1028017). - net/mlx4_core: Use cq quota in SRIOV when creating completion EQs (bsc#1028017). - net/mlx4_en: Fix bad WQE issue (bsc#1028017). - net: ena: Fix error return code in ena_device_init() (bsc#1026509). - net: ena: Remove unnecessary pci_set_drvdata() (bsc#1026509). - net: ena: change the return type of ena_set_push_mode() to be void (bsc#1026509). - net: ena: remove superfluous check in ena_remove() (bsc#1026509). - net: ena: use setup_timer() and mod_timer() (bsc#1026509). - netfilter: allow logging from non-init namespaces (bsc#970083). - nvme: Do not suspend admin queue that wasn't created (bsc#1026505). - nvme: Suspend all queues before deletion (bsc#1026505). - ping: implement proper locking (bsc#1031003). - powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895). - rtlwifi: rtl_usb: Fix missing entry in USB driver's private data (bsc#1026462). - s390/kmsg: add missing kmsg descriptions (bnc#1025683). - s390/mm: fix zone calculation in arch_add_memory() (bnc#1025683). - sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting (bsc#1018419). - scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#1027054). - scsi_dh_alua: Do not modify the interval value for retries (bsc#1012910). - softirq: Let ksoftirqd do its job (bsc#1019618). - x86, mm: fix gup_pte_range() vs DAX mappings (bsc#1026405). - x86/apic/uv: Silence a shift wrapping warning (bsc#1023866). - x86/ioapic: Change prototype of acpi_ioapic_add() (bsc#1027153, bsc#1027616). - x86/ioapic: Fix IOAPIC failing to request resource (bsc#1027153, bsc#1027616). - x86/ioapic: Fix incorrect pointers in ioapic_setup_resources() (bsc#1027153, bsc#1027616). - x86/ioapic: Fix lost IOAPIC resource after hot-removal and hotadd (bsc#1027153, bsc#1027616). - x86/ioapic: Fix setup_res() failing to get resource (bsc#1027153, bsc#1027616). - x86/ioapic: Ignore root bridges without a companion ACPI device (bsc#1027153, bsc#1027616). - x86/ioapic: Simplify ioapic_setup_resources() (bsc#1027153, bsc#1027616). - x86/ioapic: Support hot-removal of IOAPICs present during boot (bsc#1027153, bsc#1027616). - x86/ioapic: fix kABI (hide added include) (bsc#1027153, bsc#1027616). - x86/mce: Do not print MCEs when mcelog is active (bsc#1013994). - x86/mce: Fix copy/paste error in exception table entries - x86/mm/gup: Simplify get_user_pages() PTE bit handling (bsc#1026405). - x86/platform/UV: Add Support for UV4 Hubless NMIs (bsc#1023866). - x86/platform/UV: Add Support for UV4 Hubless systems (bsc#1023866). - x86/platform/UV: Add basic CPU NMI health check (bsc#1023866). - x86/platform/UV: Clean up the NMI code to match current coding style (bsc#1023866). - x86/platform/UV: Clean up the UV APIC code (bsc#1023866). - x86/platform/UV: Ensure uv_system_init is called when necessary (bsc#1023866). - x86/platform/UV: Fix 2 socket config problem (bsc#1023866). - x86/platform/UV: Fix panic with missing UVsystab support (bsc#1023866). - x86/platform/UV: Initialize PCH GPP_D_0 NMI Pin to be NMI source (bsc#1023866). - x86/platform/UV: Verify NMI action is valid, default is standard (bsc#1023866). - x86/platform/intel/iosf_mbi: Add a PMIC bus access notifier (bsc#1011913). - x86/platform/intel/iosf_mbi: Add a mutex for P-Unit access (bsc#1011913). - x86/platform: Remove warning message for duplicate NMI handlers (bsc#1029220). - x86/ras/therm_throt: Do not log a fake MCE for thermal events (bsc#1028027). - xen-blkfront: correct maximum segment accounting (bsc#1018263). - xen-blkfront: do not call talk_to_blkback when already connected to blkback. - xen-blkfront: free resources if xlvbd_alloc_gendisk fails. - xen/blkfront: Fix crash if backend does not follow the right states. - xen/netback: set default upper limit of tx/rx queues to 8 (bnc#1019163). - xen/netfront: set default upper limit of tx/rx queues to 8 (bnc#1019163). - xen: Use machine addresses in /sys/kernel/vmcoreinfo when PV (bsc#1014136) - xfs: do not take the IOLOCK exclusive for direct I/O page invalidation (bsc#1015609). - xgene_enet: remove bogus forward declarations (bsc#1032673). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP2: zypper in -t patch SUSE-SLE-WE-12-SP2-2017-697=1 - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-697=1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-697=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-697=1 - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-697=1 - SUSE Linux Enterprise High Availability 12-SP2: zypper in -t patch SUSE-SLE-HA-12-SP2-2017-697=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-697=1 - OpenStack Cloud Magnum Orchestration 7: zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-697=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64): kernel-default-debuginfo-4.4.59-92.17.3 kernel-default-debugsource-4.4.59-92.17.3 kernel-default-extra-4.4.59-92.17.3 kernel-default-extra-debuginfo-4.4.59-92.17.3 - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64): kernel-obs-build-4.4.59-92.17.3 kernel-obs-build-debugsource-4.4.59-92.17.3 - SUSE Linux Enterprise Software Development Kit 12-SP2 (noarch): kernel-docs-4.4.59-92.17.8 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): kernel-default-4.4.59-92.17.3 kernel-default-base-4.4.59-92.17.3 kernel-default-base-debuginfo-4.4.59-92.17.3 kernel-default-debuginfo-4.4.59-92.17.3 kernel-default-debugsource-4.4.59-92.17.3 kernel-default-devel-4.4.59-92.17.3 kernel-syms-4.4.59-92.17.2 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch): kernel-devel-4.4.59-92.17.2 kernel-macros-4.4.59-92.17.2 kernel-source-4.4.59-92.17.2 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64): kernel-default-4.4.59-92.17.3 kernel-default-base-4.4.59-92.17.3 kernel-default-base-debuginfo-4.4.59-92.17.3 kernel-default-debuginfo-4.4.59-92.17.3 kernel-default-debugsource-4.4.59-92.17.3 kernel-default-devel-4.4.59-92.17.3 kernel-syms-4.4.59-92.17.2 - SUSE Linux Enterprise Server 12-SP2 (noarch): kernel-devel-4.4.59-92.17.2 kernel-macros-4.4.59-92.17.2 kernel-source-4.4.59-92.17.2 - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_59-92_17-default-1-2.3 - SUSE Linux Enterprise High Availability 12-SP2 (ppc64le s390x x86_64): cluster-md-kmp-default-4.4.59-92.17.3 cluster-md-kmp-default-debuginfo-4.4.59-92.17.3 cluster-network-kmp-default-4.4.59-92.17.3 cluster-network-kmp-default-debuginfo-4.4.59-92.17.3 dlm-kmp-default-4.4.59-92.17.3 dlm-kmp-default-debuginfo-4.4.59-92.17.3 gfs2-kmp-default-4.4.59-92.17.3 gfs2-kmp-default-debuginfo-4.4.59-92.17.3 kernel-default-debuginfo-4.4.59-92.17.3 kernel-default-debugsource-4.4.59-92.17.3 ocfs2-kmp-default-4.4.59-92.17.3 ocfs2-kmp-default-debuginfo-4.4.59-92.17.3 - SUSE Linux Enterprise Desktop 12-SP2 (noarch): kernel-devel-4.4.59-92.17.2 kernel-macros-4.4.59-92.17.2 kernel-source-4.4.59-92.17.2 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): kernel-default-4.4.59-92.17.3 kernel-default-debuginfo-4.4.59-92.17.3 kernel-default-debugsource-4.4.59-92.17.3 kernel-default-devel-4.4.59-92.17.3 kernel-default-extra-4.4.59-92.17.3 kernel-default-extra-debuginfo-4.4.59-92.17.3 kernel-syms-4.4.59-92.17.2 - OpenStack Cloud Magnum Orchestration 7 (x86_64): kernel-default-4.4.59-92.17.3 kernel-default-debuginfo-4.4.59-92.17.3 kernel-default-debugsource-4.4.59-92.17.3 References: https://www.suse.com/security/cve/CVE-2016-10200.html https://www.suse.com/security/cve/CVE-2016-2117.html https://www.suse.com/security/cve/CVE-2016-9191.html https://www.suse.com/security/cve/CVE-2017-2596.html https://www.suse.com/security/cve/CVE-2017-2671.html https://www.suse.com/security/cve/CVE-2017-6074.html https://www.suse.com/security/cve/CVE-2017-6214.html https://www.suse.com/security/cve/CVE-2017-6345.html https://www.suse.com/security/cve/CVE-2017-6346.html https://www.suse.com/security/cve/CVE-2017-6347.html https://www.suse.com/security/cve/CVE-2017-6353.html https://www.suse.com/security/cve/CVE-2017-7187.html https://www.suse.com/security/cve/CVE-2017-7261.html https://www.suse.com/security/cve/CVE-2017-7294.html https://www.suse.com/security/cve/CVE-2017-7308.html https://www.suse.com/security/cve/CVE-2017-7374.html https://bugzilla.suse.com/1007959 https://bugzilla.suse.com/1007962 https://bugzilla.suse.com/1008842 https://bugzilla.suse.com/1010032 https://bugzilla.suse.com/1011913 https://bugzilla.suse.com/1012382 https://bugzilla.suse.com/1012910 https://bugzilla.suse.com/1013994 https://bugzilla.suse.com/1014136 https://bugzilla.suse.com/1015609 https://bugzilla.suse.com/1017461 https://bugzilla.suse.com/1017641 https://bugzilla.suse.com/1018263 https://bugzilla.suse.com/1018419 https://bugzilla.suse.com/1019163 https://bugzilla.suse.com/1019614 https://bugzilla.suse.com/1019618 https://bugzilla.suse.com/1020048 https://bugzilla.suse.com/1021762 https://bugzilla.suse.com/1022340 https://bugzilla.suse.com/1022785 https://bugzilla.suse.com/1023866 https://bugzilla.suse.com/1024015 https://bugzilla.suse.com/1025683 https://bugzilla.suse.com/1026024 https://bugzilla.suse.com/1026405 https://bugzilla.suse.com/1026462 https://bugzilla.suse.com/1026505 https://bugzilla.suse.com/1026509 https://bugzilla.suse.com/1026692 https://bugzilla.suse.com/1026722 https://bugzilla.suse.com/1027054 https://bugzilla.suse.com/1027066 https://bugzilla.suse.com/1027153 https://bugzilla.suse.com/1027179 https://bugzilla.suse.com/1027189 https://bugzilla.suse.com/1027190 https://bugzilla.suse.com/1027195 https://bugzilla.suse.com/1027273 https://bugzilla.suse.com/1027616 https://bugzilla.suse.com/1028017 https://bugzilla.suse.com/1028027 https://bugzilla.suse.com/1028041 https://bugzilla.suse.com/1028158 https://bugzilla.suse.com/1028217 https://bugzilla.suse.com/1028325 https://bugzilla.suse.com/1028415 https://bugzilla.suse.com/1028819 https://bugzilla.suse.com/1028895 https://bugzilla.suse.com/1029220 https://bugzilla.suse.com/1029514 https://bugzilla.suse.com/1029634 https://bugzilla.suse.com/1029986 https://bugzilla.suse.com/1030118 https://bugzilla.suse.com/1030213 https://bugzilla.suse.com/1031003 https://bugzilla.suse.com/1031052 https://bugzilla.suse.com/1031200 https://bugzilla.suse.com/1031206 https://bugzilla.suse.com/1031208 https://bugzilla.suse.com/1031440 https://bugzilla.suse.com/1031481 https://bugzilla.suse.com/1031579 https://bugzilla.suse.com/1031660 https://bugzilla.suse.com/1031662 https://bugzilla.suse.com/1031717 https://bugzilla.suse.com/1031831 https://bugzilla.suse.com/1032006 https://bugzilla.suse.com/1032673 https://bugzilla.suse.com/1032681 https://bugzilla.suse.com/897662 https://bugzilla.suse.com/951844 https://bugzilla.suse.com/968697 https://bugzilla.suse.com/969755 https://bugzilla.suse.com/970083 https://bugzilla.suse.com/977572 https://bugzilla.suse.com/977860 https://bugzilla.suse.com/978056 https://bugzilla.suse.com/980892 https://bugzilla.suse.com/981634 https://bugzilla.suse.com/982783 https://bugzilla.suse.com/987899 https://bugzilla.suse.com/988281 https://bugzilla.suse.com/991173 https://bugzilla.suse.com/998106 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
Case Mod Friday: Gears of War 4 ( -at -) ThinkComputers.org Feature Link: http://www.thinkcomputers.org/case-mod-friday-gears-of-war-4/ Image URL: http://www.thinkcomputers.org/articles/casemodfriday/gearsofwar4-email.jpg Alt Image URL: http://www.thinkcomputers.org/articles/casemodfriday/gearsofwar4-small.jpg Quote: "This week for Case Mod Friday we have a Gears of 4 themed build from ZenModz.  I really like this as we do not see many Gears of War mods as it is mainly a Xbox game, but we actually play a good amount of Gears of War 4 on PC!  This build was done inside of the Cooler Master MasterCase Maker 5, which is a delight to build in!  Check it out!"
-
TITLE: Tesoro Tuned Review ( -at -) Vortez CONTENT: Tesoro have steadily expanded their range of products since our last outing with their products. This time, we take a look at a portable in-ear headset aptly named 'Tuned'. In-ear headsets have become an important part of everyday life for many people as portable devices intrude ever-more into every aspect of our lives, and so having a competent solution that can draw attention is an understandable move. LINK: https://www.vortez.net/review.php?id=1295 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
-
TITLE: Tesoro Tuned Review ( -at -) Vortez CONTENT: Tesoro have steadily expanded their range of products since our last outing with their products. This time, we take a look at a portable in-ear headset aptly named 'Tuned'. In-ear headsets have become an important part of everyday life for many people as portable devices intrude ever-more into every aspect of our lives, and so having a competent solution that can draw attention is an understandable move. LINK: https://www.vortez.net/review.php?id=1295 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
-
TITLE: ASUS Cerberus V2 Review ( -at -) Vortez CONTENT: ASUS have addressed these issues, and implemented them in the Cerberus V2. Unlike the original Cerberus headset, it now features a bouncy steel frame, a stitched headband for additional protection, as well as improved ear cushions that provide 30% extra coverage for improved comfort and sound isolation. ASUS have also have changed the drivers, rather than shipping with the unnecessarily large 60mm drivers, they have implemented exclusive 53mm ASUS Essence drivers. This means that there is more space inside the earcup, allowing the drivers to deliver a powerful and rich sound. LINK: https://www.vortez.net/review.php?id=1296 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
-
TITLE: Corsair Carbide Series SPEC-04 Review ( -at -) Vortez CONTENT: Firm Corsair advocates will recognise the styling on SPEC-04 as it is very similar to that of the SPEC-ALPHA. However, this new mid-tower caters for those on a tighter budget - bearing all of the essential system builder features and adding in a bit of finesse too. LINK: https://www.vortez.net/review.php?id=1297 ---------------------------------------------------------------------------- -------------------- Please post this news item in your news section. Thank you.
-
Sony MDR-Z1R Review – £2,000 headphones (featuring Chord Dave DAC)
news posted a topic in Upcoming News
** Sony MDR-Z1R Review – £2,000 headphones ------------------------------------------------------------ ------------------------------------------------------------ http://mailchi.mp/kitguru/sony-mdr-z1r-review-2000-headphones-featuring-chord-dave-dac?e=872093acb5 http://www.kitguru.net ** Sony MDR-Z1R Review – £2,000 headphones (featuring Chord Dave DAC) ------------------------------------------------------------ Sony have released some iconic headphones in the past, however in recent years they have been pretty much absent from the high end arena. In a recent change of strategy they decided to unveil a new flagship headphone which they are calling the MDR-Z1R. Not the snappiest of names but after spending plenty of head time with them in recent months, I decided to share my findings with KitGuru readers. Read the review here: http://www.kitguru.net/tech-news/featured-tech-reviews/zardon/sony-mdr-z1r-review-2000-headphones-featuring-chord-dave-dac/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend2.com/forward?u=bfb2b902b5fb045ad6f841f98&id=c352bfb9af&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.