news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
Aqua Computer and Rockit Delidding Tools tested on Core i7-7700K @ techPowerUp
news posted a topic in Upcoming News
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Aqua Computer and Rockit Delidding Tools tested on Core i7-7700K Link: https://www.techpowerup.com/reviews/Intel/Delidding_the_Intel_Core_i7_7700K Brief: Intel mainstream CPUs have had a bottleneck in cooling due to poor heat transfer from the CPU die to the integrated heat spreader. Thanks to new de-lidding friendly tools released recently, it is now easier than ever before to handle this yourself and get a cooler running CPU. We examine two such solutions from Rockit Cool and Aqua Computer today, both of which promise fool-proof de-lidding and re-lidding. -
*Guru3D Rig of the Month - April 2017* The March edition of the Guru3D Rig of the April 2017 is here. The turn goes to Mike Norbert who built his own customized PC. The end-result is a nice looking rig of the month April 2017 Check out Mike's * rig right here <http://www.guru3d.com/articles-pages/guru3d-rig-of-the-month-april-2017,1.html>'>http://www.guru3d.com/articles-pages/guru3d-rig-of-the-month-april-2017,1.html> *. URL: http://www.guru3d.com/articles-pages/guru3d-rig-of-the-month-april-2017,1.html <http://www.guru3d.com/articles-pages/guru3d-rig-of-the-month-april-2017,1.html> --
-
Hardware Canucks is pleased to present our review of the Nixeus NX-VUE27P 1440P IPS Monitor. *Article URL:* http://www.hardwarecanucks.com/forum/hardware-canucks-reviews/75211-nixeus-nx-vue27p-1440p-ips-monitor-review.html *Quote:* *It might not be much to look at but the Nixeus NX-VUE27P has specifications to impress like a 27" AH-IPS panel and a 1440P resolution. Oh, and did we mention its priced less than $399 USD?* We would appreciate it if you would post this in your News section. Regards, -- Hardware Canucks News Team
-
Windows 10 Creators Update vs. Ubuntu 17.04 Linux Radeon Gaming Performance
news posted a topic in Upcoming News
At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: Windows 10 Creators Update vs. Ubuntu 17.04 Linux Radeon Gaming Performance ( -at -) Phoronix Direct Link: http://www.phoronix.com/scan.php?page=article&item=win10c-ubuntu-radeon&num=1 Summary: "Given Microsoft's Windows 10 Creators Update earlier this month and the never-ending advancements to the open-source Linux graphics driver stack along with the recent release of Ubuntu 17.04, here are some fresh benchmarks of Windows 10 vs. Ubuntu Linux when running a wide variety of cross-platform games with an AMD Radeon RX 580 and R9 Fury graphics cards." Please feel free to contact us with any questions or comments you may -
** Roccat Isku+ Force FX Analog Keyboard Review ------------------------------------------------------------ ------------------------------------------------------------ http://mailchi.mp/kitguru/roccat-isku-force-fx-analog-keyboard-review?e=872093acb5 http://www.kitguru.net ** Roccat Isku+ Force FX Analog Keyboard Review ------------------------------------------------------------ On the face of it, you would be forgiven for thinking that the Roccat Isku+ Force FX is no different to its predecessor. It is true that it keeps the tried-and-tested Isku design and layout, but this keyboard is most notable for its 6 analog keys. Will this really give you ‘total gaming domination’ as Roccat claim? Read the review here: http://www.kitguru.net/peripherals/keyboards/dominic-moass/roccat-isku-force-fx-analog-keyboard-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend2.com/forward?u=bfb2b902b5fb045ad6f841f98&id=4c874717b2&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
[security-announce] openSUSE-SU-2017:1108-1: important: Security update for tiff
news posted a topic in Upcoming News
openSUSE Security Update: Security update for tiff ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1108-1 Rating: important References: #1031247 #1031249 #1031250 #1031254 #1031255 #1031262 #1031263 Cross-References: CVE-2016-10266 CVE-2016-10267 CVE-2016-10268 CVE-2016-10269 CVE-2016-10270 CVE-2016-10271 CVE-2016-10272 Affected Products: openSUSE Leap 42.2 openSUSE Leap 42.1 ______________________________________________________________________________ An update that fixes 7 vulnerabilities is now available. Description: This update for tiff fixes the following issues: Security issues fixed: - CVE-2016-10272: LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "WRITE of size 2048" and libtiff/tif_next.c:64:9 (bsc#1031247). - CVE-2016-10271: tools/tiffcrop.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read and buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 1" and libtiff/tif_fax3.c:413:13 (bsc#1031249). - CVE-2016-10270: LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 8" and libtiff/tif_read.c:523:22 (bsc#1031250). - CVE-2016-10269: LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer over-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 512" and libtiff/tif_unix.c:340:2 (bsc#1031254). - CVE-2016-10268: tools/tiffcp.c in LibTIFF 4.0.7 allows remote attackers to cause a denial of service (integer underflow and heap-based buffer under-read) or possibly have unspecified other impact via a crafted TIFF image, related to "READ of size 78490" and libtiff/tif_unix.c:115:23 (bsc#1031255). - CVE-2016-10267: LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_ojpeg.c:816:8 (bsc#1031262). - CVE-2016-10266: LibTIFF 4.0.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted TIFF image, related to libtiff/tif_read.c:351:22. (bsc#1031263). This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-515=1 - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-515=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): libtiff-devel-4.0.7-17.3.1 libtiff5-4.0.7-17.3.1 libtiff5-debuginfo-4.0.7-17.3.1 tiff-4.0.7-17.3.1 tiff-debuginfo-4.0.7-17.3.1 tiff-debugsource-4.0.7-17.3.1 - openSUSE Leap 42.2 (x86_64): libtiff-devel-32bit-4.0.7-17.3.1 libtiff5-32bit-4.0.7-17.3.1 libtiff5-debuginfo-32bit-4.0.7-17.3.1 - openSUSE Leap 42.1 (i586 x86_64): libtiff-devel-4.0.7-18.1 libtiff5-4.0.7-18.1 libtiff5-debuginfo-4.0.7-18.1 tiff-4.0.7-18.1 tiff-debuginfo-4.0.7-18.1 tiff-debugsource-4.0.7-18.1 - openSUSE Leap 42.1 (x86_64): libtiff-devel-32bit-4.0.7-18.1 libtiff5-32bit-4.0.7-18.1 libtiff5-debuginfo-32bit-4.0.7-18.1 References: https://www.suse.com/security/cve/CVE-2016-10266.html https://www.suse.com/security/cve/CVE-2016-10267.html https://www.suse.com/security/cve/CVE-2016-10268.html https://www.suse.com/security/cve/CVE-2016-10269.html https://www.suse.com/security/cve/CVE-2016-10270.html https://www.suse.com/security/cve/CVE-2016-10271.html https://www.suse.com/security/cve/CVE-2016-10272.html https://bugzilla.suse.com/1031247 https://bugzilla.suse.com/1031249 https://bugzilla.suse.com/1031250 https://bugzilla.suse.com/1031254 https://bugzilla.suse.com/1031255 https://bugzilla.suse.com/1031262 https://bugzilla.suse.com/1031263 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org -
Micron 5100 ECO and MAX SSD Review: High-Capacity, Affordable Datacenter Storage
news posted a topic in Upcoming News
View this email in your browser (http://mailchi.mp/hothardware/intel-optane-memory-with-3d-xpoint-review-easy-robust-pc-acceleration-1082745?e=0c004f9c13) Today, we have two Micron 5100 series drives gracing our testbench, a 960GB 5100 MAX and a spacious 1920GB 5100 ECO. These can both be considered the economical cousins of Micron’s 9100 MAX NVMe speed demon we reviewed last year. The 9100 MAX costs north of $1.00 per GB, however, while the 5100 ECO and MAX register at around $0.45 and $0.59 per GB, respectively. Unlike the 9100 Series, which is built on MLC NAND flash, the 5100 Series utilizes cheaper 3D TLC NAND controlled by a 4-channel Marvell controller. TLC NAND is not typical in enterprise grade drives due to its tendency to wear out more quickly than MLC or SLC NAND. On the other hand, TLC NAND does facilitate higher capacities. So, what has Micron done to make their TLC drives enterprise ready? The answer is abundant over-provisioning... Micron 5100 ECO and MAX SSD Review: High-Capacity, Affordable Datacenter Storage (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=6bce6319e5&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=48f510fa73&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=ec1c17fc22&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=44f8a42dfe&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=064a5fb69f&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=605e4c6838&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=e0b13d6129&e=0c004f9c13 ============================================================ -
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: AZIO MK Retro Keyboard Link: https://www.techpowerup.com/reviews/AZIO/MK_Retro Brief: The MK Retro is AZIO's take on the humble typewriter modernized to the mechanical keyboard experience. Featuring unique aesthetics, pillar-style feet, and two color options to choose from, it aims to introduce some much needed style to the sub-$100 keyboard market.
-
ASUS Designo Curve MX34VQ 34in Curved Monitor ------------------------------------------------------------ http://mailchi.mp/kitguru/latest-news?e=872093acb5 http://www.kitguru.net ASUS Designo Curve MX34VQ 34in Curved Monitor The future of screens appears to be curved. We’re seeing quite a lot of new products that eschew the straight and narrow now, particularly when combined with an aspect wider than 16:9. The latest to arrive on the KitGuru review desk is the ASUS Designo Curve MX34VQ. This is a very attractively styled 34in screen, with a 21:9 aspect, and 3,440 x 1,440 resolution. Read the review here: http://www.kitguru.net/peripherals/james-morris/asus-designo-curve-mx34vq-34in-curved-monitor/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=d9aecbb009&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: FSP Windale 6 Link: https://www.techpowerup.com/reviews/FSP/Windale_6 Brief: FSP looks to break into the cooling market with their brand new Windale 6 CPU cooler. Featuring a 240 W TDP rating this sleek black tower cooler certainly looks the part. The question is can it stand out in an increasingly crowded market.
-
A news post would be great. OCC has published a review on the MSI GTX 1080 Ti Armor 11G Here is a quote from the review: Quote: â€ÂFrom a stock performance perspective, the MSI GTX 1080 Ti Armor 11G is a beast of a card. It over delivers its rated boost clock speed by a wide margin in pretty much every game and load that I tested with. This allows it to deliver exceptional performance metrics in each and every game. I mean, the NVIDIA GTX 1080 Ti FE was a great card in its own right, but MSI takes that baseline and expands on it to drive performance a little bit further. You cannot argue with the FPS performance delivered by this card. However, as an aftermarket partner built, factory overclocked card that is the expectation. At stock speeds, there is no doubt that this card is the top performer in every test. When overclocked, the margins get a bit tighter and the GTX 1080 Ti FE does outperform the MSI Armor in a few tests, but just barely.†Title: MSI GTX 1080 Ti Armor 11G Review Link: http://www.overclockersclub.com/reviews/msi_gtx_1080_ti_armor_11g/ Img: http://www.overclockersclub.com/siteimages/articles/msi_gtx_1080_ti_armor_11g/4_thumb.jpg
-
Hardware Canucks is leased to present our review of the new GIGABYTE AX370-Gaming 5 motherboard. *Article URL:* http://www.hardwarecanucks.com/forum/hardware-canucks-reviews/75162-gigabyte-ax370-gaming-5-am4-motherboard-review.html *Quote: * *Our search to find the best Ryzen motherboard has landed on Gigabyte's AX370-Gaming 5. Not only does this board offer a ton of features but its price of under $199 is pretty appealing too. * We would appreciate it if you would post this in your News section. Regards, -- Hardware Canucks News Team
-
Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: Thecus N2810 Pro 2-Bay NAS Link: https://www.techpowerup.com/reviews/Thecus/N2810Pro Brief: The N2810 Pro from Thecus uses an Intel Celeron N3160 Quad-Core CPU, which offers sufficient computing power for entry level users who are on a tight budget. It also supports high-speed transfers using two Gigabit Ethernet interfaces and comes with HDMI as well as DisplayPort connectivity.
-
View this email in your browser (http://mailchi.mp/63b21b6cc6e8/cougar-armor-gaming-chair-review?e=8138df6da5) ** Benchmark Reviews Presents: ------------------------------------------------------------ COUGAR-Armor-Gaming-Chair-Front-Left-Corner TITLE: COUGAR Armor Gaming Chair Review (http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=a9dc8d0633&e=8138df6da5) QUOTE: When Champ Chairs offered us a chance to test the COUGAR Armor gaming chair, I couldn’t say no. Literally, my body wouldn’t allow it. COUGAR is well known to gamers for their keyboard and mouse peripherals, but they also rock my favorite color on their products: orange. It looks great (to me), but how does it feel after extended gaming? LINK: http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=6d3936b73a&e=8138df6da5 IMAGE: http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=f45c74e025&e=8138df6da5 ============================================================ ** (http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=8d13bdd2bd&e=8138df6da5) ** (http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=c8aa4a3757&e=8138df6da5) ** (http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=11ba826941&e=8138df6da5)
-
SUSE Security Update: Security update for the Linux Kernel ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:1102-1 Rating: important References: #1003077 #1003344 #1003568 #1003677 #1003813 #1003866 #1003925 #1004517 #1004520 #1005857 #1005877 #1005896 #1005903 #1006917 #1006919 #1007615 #1007944 #1008557 #1008645 #1008831 #1008833 #1008893 #1009875 #1010150 #1010175 #1010201 #1010467 #1010501 #1010507 #1010711 #1010716 #1011685 #1011820 #1012411 #1012422 #1012832 #1012851 #1012917 #1013018 #1013038 #1013042 #1013070 #1013531 #1013533 #1013542 #1013604 #1014410 #1014454 #1014746 #1015561 #1015752 #1015760 #1015796 #1015803 #1015817 #1015828 #1015844 #1015848 #1015878 #1015932 #1016320 #1016505 #1016520 #1016668 #1016688 #1016824 #1016831 #1017686 #1017710 #1019148 #1019165 #1019348 #1019783 #1020214 #1021258 #748806 #763198 #771065 #786036 #790588 #795297 #799133 #800999 #803320 #821612 #824171 #851603 #853052 #860441 #863873 #865783 #871728 #901809 #907611 #908458 #908684 #909077 #909350 #909484 #909491 #909618 #913387 #914939 #919382 #922634 #924708 #925065 #928138 #929141 #953233 #956514 #960689 #961589 #962846 #963655 #967716 #968010 #969340 #973203 #973691 #979681 #984194 #986337 #987333 #987576 #989152 #989680 #989764 #989896 #990245 #992566 #992991 #993739 #993832 #995968 #996541 #996557 #997401 #998689 #999101 #999907 Cross-References: CVE-2004-0230 CVE-2012-6704 CVE-2013-6368 CVE-2015-1350 CVE-2015-8956 CVE-2015-8962 CVE-2015-8964 CVE-2016-10088 CVE-2016-3841 CVE-2016-5696 CVE-2016-7042 CVE-2016-7097 CVE-2016-7117 CVE-2016-7910 CVE-2016-7911 CVE-2016-7916 CVE-2016-8399 CVE-2016-8632 CVE-2016-8633 CVE-2016-8646 CVE-2016-9555 CVE-2016-9576 CVE-2016-9685 CVE-2016-9756 CVE-2016-9793 CVE-2016-9794 CVE-2017-5551 Affected Products: SUSE Linux Enterprise Real Time Extension 11-SP4 SUSE Linux Enterprise Debuginfo 11-SP4 ______________________________________________________________________________ An update that solves 27 vulnerabilities and has 114 fixes is now available. Description: The SLE-11 SP4 kernel was updated to 3.0.101.rt130-68 to receive various security and bugfixes. The following security bugs were fixed: - CVE-2017-5551: The simple_set_acl function in fs/posix_acl.c in the Linux kernel preserved the setgid bit during a setxattr call involving a tmpfs filesystem, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097 (bnc#1021258). - CVE-2016-7097: posix_acl: Clear SGID bit when setting file permissions (bsc#995968). - CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710). - CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#989152). - CVE-2015-1350: Denial of service in notify_change for filesystem xattrs (bsc#914939). - CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831). - CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could have enabled a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. (bnc#1014746). - CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531). - CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542). - CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038). - CVE-2016-9576: splice: introduce FMODE_SPLICE_READ and FMODE_SPLICE_WRITE (bsc#1013604) - CVE-2016-9794: ALSA: pcm : Call kill_fasync() in stream lock (bsc#1013533) - CVE-2016-3841: KABI workaround for ipv6: add complete rcu protection around np->opt (bsc#992566). - CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832). - CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501). - CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacks chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685). - CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716). - CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711). - CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address (bnc#853052). - CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507). - CVE-2016-7916: Revert "proc: prevent accessing /proc//environ until it's ready (bsc#1010467)" - CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150). - CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833). - CVE-2016-7042: KEYS: Fix short sprintf buffer in /proc/keys show function (bsc#1004517). - CVE-2015-8956: Bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925). - CVE-2016-7117: net: Fix use after free in the recvmmsg exit path (bsc#1003077). The following non-security bugs were fixed: - blacklist.conf: 45f13df be2net: Enable Wake-On-LAN from shutdown for Skyhawk - blacklist.conf: c9cc599 net/mlx4_core: Fix QUERY FUNC CAP flags - 8250_pci: Fix potential use-after-free in error path (bsc#1013070). - IB/mlx4: Fix error flow when sending mads under SRIOV (bsc#786036). - IB/mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036). - IB/mlx4: Fix memory leak if QP creation failed (bsc#786036). - IB/mlx4: Fix potential deadlock when sending mad to wire (bsc#786036). - IB/mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036). - IB/mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036). - apparmor: fix IRQ stack overflow during free_profile (bsc#1009875). - arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716). - be2net: Do not leak iomapped memory on removal (bug#925065). - block_dev: do not test bdev->bd_contains when it is not stable (bsc#1008557). - bna: Add synchronization for tx ring (bsc#993739). - bnx2x: Correct ringparam estimate when DOWN (bsc#1020214). - bnx2x: fix lockdep splat (bsc#908684). - cifs: revert fs/cifs: fix wrongly prefixed path to root (bsc#963655) - config.conf: add bigmem flavour on ppc64 - cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866). - cpumask_set_cpu_local_first => cpumask_local_spread, lament (bug#919382). - crypto: add ghash-generic in the supported.conf(bsc#1016824) - crypto: aesni - Add support for 192 & 256 bit keys to AESNI RFC4106 (bsc#913387, #bsc1016831). - dm space map metadata: fix sm_bootstrap_get_nr_blocks() - dm thin: fix race condition when destroying thin pool workqueue - dm: do not call dm_sync_table() when creating new devices (bnc#901809, bsc#1008893). - drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348) - ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668). - ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018). - ext4: fix reference counting bug on block allocation error (bsc#1013018). - fs/cifs: Compare prepaths when comparing superblocks (bsc#799133). - fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133). - fs/cifs: Fix regression which breaks DFS mounting (bsc#799133). - fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133). - fs/cifs: cifs_get_root shouldn't use path with tree name (bsc#963655, bsc#979681). - fs/cifs: make share unaccessible at root level mountable (bsc#799133). - futex: Acknowledge a new waiter in counter before plist (bsc#851603). - futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603). - hpilo: Add support for iLO5 (bsc#999101). - hv: do not lose pending heartbeat vmbus packets (bnc#1006919). - hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#986337). - hv: vmbus: avoid wait_for_completion() on crash (bnc#986337). - hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#986337). - hv: vmbus: do not send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bnc#986337). - hv: vmbus: handle various crash scenarios (bnc#986337). - hv: vmbus: remove code duplication in message handling (bnc#986337). - hv: vss: run only on supported host versions (bnc#986337). - i40e: fix an uninitialized variable bug (bsc#909484). - ibmveth: calculate gso_segs for large packets (bsc#1019165, bsc#1019148). - ibmveth: set correct gso_size and gso_type (bsc#1019165, bsc#1019148). - igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491). - igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297). - igb: Fix oops caused by missing queue pairing (bsc#909491). - igb: Fix oops on changing number of rings (bsc#909491). - igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491). - igb: Unpair the queues when changing the number of queues (bsc#909491). - ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#865783). - kabi-fix for flock_owner addition (bsc#998689). - kexec: add a kexec_crash_loaded() function (bsc#973691). - kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680). - kvm: Distangle eventfd code from irqchip (bsc#989680). - kvm: Iterate over only vcpus that are preempted (bsc#989680). - kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680). - kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680). - kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680). - kvm: make processes waiting on vcpu mutex killable (bsc#989680). - kvm: nVMX: Add preemption timer support (bsc#989680). - kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680). - kvm: use symbolic constant for nr interrupts (bsc#989680). - kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680). - kvm: x86: Run PIT work in own kthread (bsc#989680). - kvm: x86: limit difference between kvmclock updates (bsc#989680). - kvm: x86: only channel 0 of the i8254 is linked to the HPET (bsc#960689). - lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866). - libata: introduce ata_host->n_tags to avoid oops on SAS controllers (bsc#871728). - libata: remove n_tags to avoid kABI breakage (bsc#871728). - libata: support the ata host which implements a queue depth less than 32 (bsc#871728) - libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846). - libfc: Fixup disc_mutex handling (bsc#962846). - libfc: Issue PRLI after a PRLO has been received (bsc#962846). - libfc: Revisit kref handling (bnc#990245). - libfc: Update rport reference counting (bsc#953233). - libfc: do not send ABTS when resetting exchanges (bsc#962846). - libfc: fixup locking of ptp_setup() (bsc#962846). - libfc: reset exchange manager during LOGO handling (bsc#962846). - libfc: send LOGO for PLOGI failure (bsc#962846). - locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411). - md/raid10: Fix memory leak when raid10 reshape completes - md/raid10: always set reshape_safe when initializing reshape_position - md: Drop sending a change uevent when stopping (bsc#1003568). - md: check command validity early in md_ioctl() (bsc#1004520). - md: fix problem when adding device to read-only array with bitmap (bnc#771065). - memstick: mspro_block: add missing curly braces (bsc#1016688). - mlx4: add missing braces in verify_qp_parameters (bsc#786036). - mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations (bnc#763198). - mm/memory.c: actually remap enough memory (bnc#1005903). - mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589). - mm: fix crashes from mbind() merging vmas (bnc#1005877). - mm: fix sleeping function warning from __put_anon_vma (bnc#1005857). - dcache: move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194). - mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820). - mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645). - mshyperv: fix recognition of Hyper-V guest crash MSR's (bnc#986337). - net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036). - net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382). - net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036). - net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708). - net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708 bsc#786036). - net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bug#919382). - net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036). - net/mlx4_core: Implement pci_resume callback (bsc#924708). - net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382). - net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382). - net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382). - net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036). - net/mlx4_en: Move filters cleanup to a proper location (bsc#786036). - net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382). - net/mlx4_en: fix spurious timestamping callbacks (bsc#919382). - netfilter: ipv4: defrag: set local_df flag on defragmented skb (bsc#907611). - netfront: do not truncate grant references. - netvsc: fix incorrect receive checksum offloading (bnc#1006917). - nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944). - nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514). - nfsv4.1: Fix an NFSv4.1 state renewal regression (bnc#863873). - nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410). - nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410). - nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410). - nfsv4: add flock_owner to open context (bnc#998689). - nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689). - nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689). - nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689). - nvme: Automatic namespace rescan (bsc#1017686). - nvme: Metadata format support (bsc#1017686). - ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783). - oom: print nodemask in the oom report (bnc#1003866). - pci_ids: Add PCI device ID functions 3 and 4 for newer F15h models - pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441). - posix-timers: Remove remaining uses of tasklist_lock (bnc#997401). - posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401). - posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401). - powerpc/64: Fix incorrect return value from __copy_tofrom_user (bsc#1005896). - powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes). - powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes). - powerpc/mm: Add 64TB support (bsc#928138,fate#319026). - powerpc/mm: Change the swap encoding in pte (bsc#973203). - powerpc/mm: Convert virtual address to vpn (bsc#928138,fate#319026). - powerpc/mm: Fix hash computation function (bsc#928138,fate#319026). - powerpc/mm: Increase the slice range to 64TB (bsc#928138,fate#319026). - powerpc/mm: Make KERN_VIRT_SIZE not dependend on PGTABLE_RANGE (bsc#928138,fate#319026). - powerpc/mm: Make some of the PGTABLE_RANGE dependency explicit (bsc#928138,fate#319026). - powerpc/mm: Replace open coded CONTEXT_BITS value (bsc#928138,fate#319026). - powerpc/mm: Simplify hpte_decode (bsc#928138,fate#319026). - powerpc/mm: Update VSID allocation documentation (bsc#928138,fate#319026). - powerpc/mm: Use 32bit array for slb cache (bsc#928138,fate#319026). - powerpc/mm: Use hpt_va to compute virtual address (bsc#928138,fate#319026). - powerpc/mm: Use the required number of VSID bits in slbmte (bsc#928138,fate#319026). - powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes). - powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813). - powerpc: Add ability to build little endian kernels (bsc#967716). - powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716). - powerpc: Build fix for powerpc KVM (bsc#928138,fate#319026). - powerpc: Do not build assembly files with ABIv2 (bsc#967716). - powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716). - powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716). - powerpc: Fix error when cross building TAGS & cscope (bsc#967716). - powerpc: Make VSID_BITS* dependency explicit (bsc#928138,fate#319026). - powerpc: Make the vdso32 also build big-endian (bsc#967716). - powerpc: Move kdump default base address to half RMO size on 64bit (bsc#1003344). - powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716). - powerpc: Remove buggy 9-year-old test for binutils < 2.12.1 (bsc#967716). - powerpc: Rename USER_ESID_BITS* to ESID_BITS* (bsc#928138,fate#319026). - powerpc: Require gcc 4.0 on 64-bit (bsc#967716). - powerpc: Update kernel VSID range (bsc#928138,fate#319026). - powerpc: blacklist fixes for unsupported subarchitectures ppc32 only: 6e0fdf9af216 powerpc: fix typo 'CONFIG_PMAC' obscure hardware: f7e9e3583625 powerpc: Fix missing L2 cache size in /sys/devices/system/cpu - powerpc: dtc is required to build dtb files (bsc#967716). - powerpc: fix typo 'CONFIG_PPC_CPU' (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes). - powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes). - printk/sched: Introduce special printk_sched() for those awkward (bsc#1013042, bsc#996541, bsc#1015878). - ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851). - qlcnic: fix a loop exit condition better (bsc#909350). - qlcnic: fix a timeout loop (bsc#909350) - qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999). - reiserfs: fix race in prealloc discard (bsc#987576). - rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again - rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422) - rpm/package-descriptions: add -bigmem description - rt2x00: fix rfkill regression on rt2500pci (bnc#748806). - s390/cio: fix accidental interrupt enabling during resume (bnc#1003677, LTC#147606). - s390/time: LPAR offset handling (bnc#1003677, LTC#146920). - s390/time: move PTFF definitions (bnc#1003677, LTC#146920). - scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557). - scsi: lpfc: avoid double free of resource identifiers (bsc#989896). - scsi: zfcp: spin_lock_irqsave() is not nestable (bsc#1003677,LTC#147374). - scsi_error: count medium access timeout only once per EH run (bsc#993832). - scsi_error: fixup crash in scsi_eh_reset (bsc#993832) - serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070). - sfc: on MC reset, clear PIO buffer linkage in TXQs (bsc#909618). - softirq: sirq threads raising another sirq delegate to the proper thread Otherwise, high priority timer threads expend cycles precessing other sirqs, potentially increasing wakeup latencies as thes process sirqs at a priority other than the priority specified by the user. - sunrpc/cache: drop reference when sunrpc_cache_pipe_upcall() detects a race (bnc#803320). - sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917). - sunrpc: Fix reconnection timeouts (bsc#1014410). - sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917). - sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410). - tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175). - tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175). - tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175). - tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175). - tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#908458). - tg3: Fix temperature reporting (bnc#790588). - tty: Signal SIGHUP before hanging up ldisc (bnc#989764). - usb: console: fix potential use after free (bsc#1015817). - usb: console: fix uninitialised ldisc semaphore (bsc#1015817). - usb: cp210x: Corrected USB request type definitions (bsc#1015932). - usb: cp210x: relocate private data from USB interface to port (bsc#1015932). - usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932). - usb: ftdi_sio: fix null deref at port probe (bsc#1015796). - usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634). - usb: hub: Fix unbalanced reference count/memory leak/deadlocks (bsc#968010). - usb: ipaq.c: fix a timeout loop (bsc#1015848). - usb: opticon: fix non-atomic allocation in write path (bsc#1015803). - usb: option: fix runtime PM handling (bsc#1015752). - usb: serial: cp210x: add 16-bit register access functions (bsc#1015932). - usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932). - usb: serial: cp210x: add new access functions for large registers (bsc#1015932). - usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932). - usb: serial: fix potential use-after-free after failed probe (bsc#1015828). - usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505). - usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505). - usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520). - usb: sierra: fix AA deadlock in open error path (bsc#1015561). - usb: sierra: fix remote wakeup (bsc#1015561). - usb: sierra: fix urb and memory leak in resume error path (bsc#1015561). - usb: sierra: fix urb and memory leak on disconnect (bsc#1015561). - usb: sierra: fix use after free at suspend/resume (bsc#1015561). - usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760). - usb: usb_wwan: fix race between write and resume (bsc#1015760). - usb: usb_wwan: fix urb leak at shutdown (bsc#1015760). - usb: usb_wwan: fix urb leak in write error path (bsc#1015760). - usb: usb_wwan: fix write and suspend race (bsc#1015760). - usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615). - usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844). - vmxnet3: Wake queue from reset work (bsc#999907). - x86, amd_nb: Clarify F15h, model 30h GART and L3 support - x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141). - x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077). - x86/cpu/amd: Set X86_FEATURE_EXTD_APICID for future processors - x86/gart: Check for GART support before accessing GART registers - xenbus: do not invoke ->is_ready() for most device states (bsc#987333). - zcrypt: Fix hang condition on crypto card config-off (bsc#1016320). - zcrypt: Fix invalid domain response handling (bsc#1016320). - zfcp: Fix erratic device offline during EH (bsc#993832). - zfcp: close window with unblocked rport during rport gone (bnc#1003677). - zfcp: fix D_ID field with actual value on tracing SAN responses (bnc#1003677). - zfcp: fix ELS/GS request&response length for hardware data router (bnc#1003677). - zfcp: fix payload trace length for SAN request&response (bnc#1003677). - zfcp: restore tracing of handle for port and LUN with HBA records (bnc#1003677). - zfcp: restore: Dont use 0 to indicate invalid LUN in rec trace (bnc#1003677). - zfcp: retain trace level for SCSI and HBA FSF response records (bnc#1003677). - zfcp: trace full payload of all SAN records (req,resp,iels) (bnc#1003677). - zfcp: trace on request for open and close of WKA port (bnc#1003677). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Real Time Extension 11-SP4: zypper in -t patch slertesp4-kernel-13074=1 - SUSE Linux Enterprise Debuginfo 11-SP4: zypper in -t patch dbgsp4-kernel-13074=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Real Time Extension 11-SP4 (x86_64): kernel-rt-3.0.101.rt130-68.1 kernel-rt-base-3.0.101.rt130-68.1 kernel-rt-devel-3.0.101.rt130-68.1 kernel-rt_trace-3.0.101.rt130-68.1 kernel-rt_trace-base-3.0.101.rt130-68.1 kernel-rt_trace-devel-3.0.101.rt130-68.1 kernel-source-rt-3.0.101.rt130-68.1 kernel-syms-rt-3.0.101.rt130-68.1 - SUSE Linux Enterprise Debuginfo 11-SP4 (x86_64): kernel-rt-debuginfo-3.0.101.rt130-68.1 kernel-rt-debugsource-3.0.101.rt130-68.1 kernel-rt_debug-debuginfo-3.0.101.rt130-68.1 kernel-rt_debug-debugsource-3.0.101.rt130-68.1 kernel-rt_trace-debuginfo-3.0.101.rt130-68.1 kernel-rt_trace-debugsource-3.0.101.rt130-68.1 References: https://www.suse.com/security/cve/CVE-2004-0230.html https://www.suse.com/security/cve/CVE-2012-6704.html https://www.suse.com/security/cve/CVE-2013-6368.html https://www.suse.com/security/cve/CVE-2015-1350.html https://www.suse.com/security/cve/CVE-2015-8956.html https://www.suse.com/security/cve/CVE-2015-8962.html https://www.suse.com/security/cve/CVE-2015-8964.html https://www.suse.com/security/cve/CVE-2016-10088.html https://www.suse.com/security/cve/CVE-2016-3841.html https://www.suse.com/security/cve/CVE-2016-5696.html https://www.suse.com/security/cve/CVE-2016-7042.html https://www.suse.com/security/cve/CVE-2016-7097.html https://www.suse.com/security/cve/CVE-2016-7117.html https://www.suse.com/security/cve/CVE-2016-7910.html https://www.suse.com/security/cve/CVE-2016-7911.html https://www.suse.com/security/cve/CVE-2016-7916.html https://www.suse.com/security/cve/CVE-2016-8399.html https://www.suse.com/security/cve/CVE-2016-8632.html https://www.suse.com/security/cve/CVE-2016-8633.html https://www.suse.com/security/cve/CVE-2016-8646.html https://www.suse.com/security/cve/CVE-2016-9555.html https://www.suse.com/security/cve/CVE-2016-9576.html https://www.suse.com/security/cve/CVE-2016-9685.html https://www.suse.com/security/cve/CVE-2016-9756.html https://www.suse.com/security/cve/CVE-2016-9793.html https://www.suse.com/security/cve/CVE-2016-9794.html https://www.suse.com/security/cve/CVE-2017-5551.html https://bugzilla.suse.com/1003077 https://bugzilla.suse.com/1003344 https://bugzilla.suse.com/1003568 https://bugzilla.suse.com/1003677 https://bugzilla.suse.com/1003813 https://bugzilla.suse.com/1003866 https://bugzilla.suse.com/1003925 https://bugzilla.suse.com/1004517 https://bugzilla.suse.com/1004520 https://bugzilla.suse.com/1005857 https://bugzilla.suse.com/1005877 https://bugzilla.suse.com/1005896 https://bugzilla.suse.com/1005903 https://bugzilla.suse.com/1006917 https://bugzilla.suse.com/1006919 https://bugzilla.suse.com/1007615 https://bugzilla.suse.com/1007944 https://bugzilla.suse.com/1008557 https://bugzilla.suse.com/1008645 https://bugzilla.suse.com/1008831 https://bugzilla.suse.com/1008833 https://bugzilla.suse.com/1008893 https://bugzilla.suse.com/1009875 https://bugzilla.suse.com/1010150 https://bugzilla.suse.com/1010175 https://bugzilla.suse.com/1010201 https://bugzilla.suse.com/1010467 https://bugzilla.suse.com/1010501 https://bugzilla.suse.com/1010507 https://bugzilla.suse.com/1010711 https://bugzilla.suse.com/1010716 https://bugzilla.suse.com/1011685 https://bugzilla.suse.com/1011820 https://bugzilla.suse.com/1012411 https://bugzilla.suse.com/1012422 https://bugzilla.suse.com/1012832 https://bugzilla.suse.com/1012851 https://bugzilla.suse.com/1012917 https://bugzilla.suse.com/1013018 https://bugzilla.suse.com/1013038 https://bugzilla.suse.com/1013042 https://bugzilla.suse.com/1013070 https://bugzilla.suse.com/1013531 https://bugzilla.suse.com/1013533 https://bugzilla.suse.com/1013542 https://bugzilla.suse.com/1013604 https://bugzilla.suse.com/1014410 https://bugzilla.suse.com/1014454 https://bugzilla.suse.com/1014746 https://bugzilla.suse.com/1015561 https://bugzilla.suse.com/1015752 https://bugzilla.suse.com/1015760 https://bugzilla.suse.com/1015796 https://bugzilla.suse.com/1015803 https://bugzilla.suse.com/1015817 https://bugzilla.suse.com/1015828 https://bugzilla.suse.com/1015844 https://bugzilla.suse.com/1015848 https://bugzilla.suse.com/1015878 https://bugzilla.suse.com/1015932 https://bugzilla.suse.com/1016320 https://bugzilla.suse.com/1016505 https://bugzilla.suse.com/1016520 https://bugzilla.suse.com/1016668 https://bugzilla.suse.com/1016688 https://bugzilla.suse.com/1016824 https://bugzilla.suse.com/1016831 https://bugzilla.suse.com/1017686 https://bugzilla.suse.com/1017710 https://bugzilla.suse.com/1019148 https://bugzilla.suse.com/1019165 https://bugzilla.suse.com/1019348 https://bugzilla.suse.com/1019783 https://bugzilla.suse.com/1020214 https://bugzilla.suse.com/1021258 https://bugzilla.suse.com/748806 https://bugzilla.suse.com/763198 https://bugzilla.suse.com/771065 https://bugzilla.suse.com/786036 https://bugzilla.suse.com/790588 https://bugzilla.suse.com/795297 https://bugzilla.suse.com/799133 https://bugzilla.suse.com/800999 https://bugzilla.suse.com/803320 https://bugzilla.suse.com/821612 https://bugzilla.suse.com/824171 https://bugzilla.suse.com/851603 https://bugzilla.suse.com/853052 https://bugzilla.suse.com/860441 https://bugzilla.suse.com/863873 https://bugzilla.suse.com/865783 https://bugzilla.suse.com/871728 https://bugzilla.suse.com/901809 https://bugzilla.suse.com/907611 https://bugzilla.suse.com/908458 https://bugzilla.suse.com/908684 https://bugzilla.suse.com/909077 https://bugzilla.suse.com/909350 https://bugzilla.suse.com/909484 https://bugzilla.suse.com/909491 https://bugzilla.suse.com/909618 https://bugzilla.suse.com/913387 https://bugzilla.suse.com/914939 https://bugzilla.suse.com/919382 https://bugzilla.suse.com/922634 https://bugzilla.suse.com/924708 https://bugzilla.suse.com/925065 https://bugzilla.suse.com/928138 https://bugzilla.suse.com/929141 https://bugzilla.suse.com/953233 https://bugzilla.suse.com/956514 https://bugzilla.suse.com/960689 https://bugzilla.suse.com/961589 https://bugzilla.suse.com/962846 https://bugzilla.suse.com/963655 https://bugzilla.suse.com/967716 https://bugzilla.suse.com/968010 https://bugzilla.suse.com/969340 https://bugzilla.suse.com/973203 https://bugzilla.suse.com/973691 https://bugzilla.suse.com/979681 https://bugzilla.suse.com/984194 https://bugzilla.suse.com/986337 https://bugzilla.suse.com/987333 https://bugzilla.suse.com/987576 https://bugzilla.suse.com/989152 https://bugzilla.suse.com/989680 https://bugzilla.suse.com/989764 https://bugzilla.suse.com/989896 https://bugzilla.suse.com/990245 https://bugzilla.suse.com/992566 https://bugzilla.suse.com/992991 https://bugzilla.suse.com/993739 https://bugzilla.suse.com/993832 https://bugzilla.suse.com/995968 https://bugzilla.suse.com/996541 https://bugzilla.suse.com/996557 https://bugzilla.suse.com/997401 https://bugzilla.suse.com/998689 https://bugzilla.suse.com/999101 https://bugzilla.suse.com/999907 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
Artful Aardvark has been open since Friday, but it's been noted that since doko's on vacation, and I passed out after opening the archive, no one got around to sending the announcement email. Artful opened with two major packaging toolchain changes, both of which should be mostly transparent: - ddebs are now generated using the upstream debhelper code, and you'll notice that pkg-create-dbgsym gets punted out of your build chroots on upgrade. If you run into any ddeb issues that arise from this, please file bugs and/or poke me directly. - dpkg now produces .buildinfo files by default for all uploads, including source builds. This should, again, be mostly a no-op for you, but there is one gotcha, which is that multiple '-nc' runs of dpkg-buildpackage -S will produce a debian/files in your source that shouldn't be there. We've been discussing how to eradicate that upstream, but if you care deeply about cruft, watch out for that. Of future note, we will be evaluating enabling PIE by default on all of our architectures (which will affect i386, armhf, and arm64), and assuming those discussions go as planned, this should happen in a month or two. This will bring us in line with Debian in that regard, which should make life a little bit easier for evaluating FTBFS bugs between the two distros. autosyncs will be turned on shortly, and the buildd queues will fill up and take a few days (probably) to drain, so do be slightly patient while waiting to see what needs sorting out in proposed-migration. Also, of note, we ended last cycle with all our "problem" reports completely empty. That means the archive had no out of date binaries, and everything was installable. This is not a situation we intend to regress, so before asking a release team member to "force" anything in to artful, understand that forcing implies breaking this state, and there has to be a better way. Please, find the better way. Happy merging, everyone, and may the Aardvarks be ever in your favour. ... Adam --
-
[Tech ARP] Here's Why The Galaxy S8 Red Screen Is A Software Issue
news posted a topic in Upcoming News
Legit Reviews took a quick look at the new AMD Ryzen Balanced plan a couple weeks ago, and we did see a performance increase in a couple of games. We decided to expand the testing to fourteen games and 3DMark Fire Strike Extreme putting the AMD Ryzen 7 1700X against the Intel Core i7-7700k. Read on to see how it turned out! Article Title: Intel Core i7-7700k versus AMD Ryzen 1700X 14 Game CPU Showdown ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/intel-core-i7-7700k-versus-amd-ryzen-1700x-14-game-cpu-showdown_192508 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/news// = -
Intel Core i7-7700k versus AMD Ryzen 1700X - 14 Game CPU Showdown @ Legit Reviews
news posted a topic in Upcoming News
Legit Reviews took a quick look at the new AMD Ryzen Balanced plan a couple weeks ago, and we did see a performance increase in a couple of games. We decided to expand the testing to fourteen games and 3DMark Fire Strike Extreme putting the AMD Ryzen 7 1700X against the Intel Core i7-7700k. Read on to see how it turned out! Article Title: Intel Core i7-7700k versus AMD Ryzen 1700X 14 Game CPU Showdown ( -at -) Legit Reviews Article URL: http://www.legitreviews.com/intel-core-i7-7700k-versus-amd-ryzen-1700x-14-game-cpu-showdown_192508 Unsubscribe: http://adserv.legitreviews.com/cgi-bin/dada/mail.cgi/u/legitpr/reviewnews// = -
Corsair's K95 Platinum recasts the company's most macro-friendly keyboard with fancier lighting, new media controls, and a handy new profile-switching key, among other improvements. We locked and loaded with the K95 Platinum to see whether it's the king of the keyboard hill. Read more: http://techreport.com/review/31742/corsair-k95-rgb-platinum-gaming-keyboard-reviewed --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser.
-
[RHSA-2017:1124-01] Important: chromium-browser security update
news posted a topic in Upcoming News
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: chromium-browser security update Advisory ID: RHSA-2017:1124-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2017:1124 Issue date: 2017-04-25 CVE Names: CVE-2017-5057 CVE-2017-5058 CVE-2017-5059 CVE-2017-5060 CVE-2017-5061 CVE-2017-5062 CVE-2017-5063 CVE-2017-5064 CVE-2017-5065 CVE-2017-5066 CVE-2017-5067 CVE-2017-5069 ===================================================================== 1. Summary: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 3. Description: Chromium is an open-source web browser, powered by WebKit (Blink). This update upgrades Chromium to version 58.0.3029.81. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim. (CVE-2017-5057, CVE-2017-5058, CVE-2017-5059, CVE-2017-5060, CVE-2017-5061, CVE-2017-5062, CVE-2017-5063, CVE-2017-5064, CVE-2017-5065, CVE-2017-5066, CVE-2017-5067, CVE-2017-5069) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Chromium must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1443835 - CVE-2017-5057 chromium-browser: type confusion in pdfium 1443836 - CVE-2017-5058 chromium-browser: heap use after free in print preview 1443837 - CVE-2017-5059 chromium-browser: type confusion in blink 1443838 - CVE-2017-5060 chromium-browser: url spoofing in omnibox 1443839 - CVE-2017-5061 chromium-browser: url spoofing in omnibox 1443840 - CVE-2017-5062 chromium-browser: use after free in chrome apps 1443841 - CVE-2017-5063 chromium-browser: heap overflow in skia 1443845 - CVE-2017-5064 chromium-browser: use after free in blink 1443847 - CVE-2017-5065 chromium-browser: incorrect ui in blink 1443848 - CVE-2017-5066 chromium-browser: incorrect signature handing in networking 1443849 - CVE-2017-5067 chromium-browser: url spoofing in omnibox 1443850 - CVE-2017-5069 chromium-browser: cross-origin bypass in blink 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: chromium-browser-58.0.3029.81-1.el6_9.i686.rpm chromium-browser-debuginfo-58.0.3029.81-1.el6_9.i686.rpm x86_64: chromium-browser-58.0.3029.81-1.el6_9.x86_64.rpm chromium-browser-debuginfo-58.0.3029.81-1.el6_9.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: chromium-browser-58.0.3029.81-1.el6_9.i686.rpm chromium-browser-debuginfo-58.0.3029.81-1.el6_9.i686.rpm x86_64: chromium-browser-58.0.3029.81-1.el6_9.x86_64.rpm chromium-browser-debuginfo-58.0.3029.81-1.el6_9.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: chromium-browser-58.0.3029.81-1.el6_9.i686.rpm chromium-browser-debuginfo-58.0.3029.81-1.el6_9.i686.rpm x86_64: chromium-browser-58.0.3029.81-1.el6_9.x86_64.rpm chromium-browser-debuginfo-58.0.3029.81-1.el6_9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-5057 https://access.redhat.com/security/cve/CVE-2017-5058 https://access.redhat.com/security/cve/CVE-2017-5059 https://access.redhat.com/security/cve/CVE-2017-5060 https://access.redhat.com/security/cve/CVE-2017-5061 https://access.redhat.com/security/cve/CVE-2017-5062 https://access.redhat.com/security/cve/CVE-2017-5063 https://access.redhat.com/security/cve/CVE-2017-5064 https://access.redhat.com/security/cve/CVE-2017-5065 https://access.redhat.com/security/cve/CVE-2017-5066 https://access.redhat.com/security/cve/CVE-2017-5067 https://access.redhat.com/security/cve/CVE-2017-5069 https://access.redhat.com/security/updates/classification/#important https://chromereleases.googleblog.com/2017/04/stable-channel-update-for-desktop.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFY/xN0XlSAg2UNWIIRAvX+AJ9JHIyPP81ntPxOc7WxkbEsmNCFcACcCmSf QnqiczHQ1+J8yMv656p23mY= =X2se -----END PGP SIGNATURE----- -- -
Dragon Flair Inferno GR4 (i7 7700K/ GTX1080) System Review ------------------------------------------------------------ http://mailchi.mp/kitguru/dragon-flair-inferno-gr4-i7-7700k-gtx1080-system-review?e=872093acb5 http://www.kitguru.net Dragon Flair Inferno GR4 (i7 7700K/ GTX1080) System Review Dragon Flair is a relatively new system integrator based in Ireland. They got in-touch with us and today we are looking at a high-end gaming PC from the company – the Inferno GR4. With as much emphasis on the system’s aesthetics as there is on its hardware, it will be very interesting to see if the Inferno GR4 can justify its hefty £2139 asking price. Read the review here: http://www.kitguru.net/desktop-pc/gaming-rig/dominic-moass/dragon-flair-inferno-gr4-7700k1080-system-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=ccd7ffd3d6&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
<http://www.eteknix.com> ASUS RoG STRIX GTX 1080 Ti 11GB Graphics Card Review ASUS are one of the biggest and most popular brands in the world when it comes to high-end gaming hardware, and their RoG product ranges have won many awards for being some of the best on the market. With that in mind, I'm very excited today to be testing their latest RoG STRIX GeForce GTX 1080 Ti OC Edition Graphics Card. It comes with powerful factory overclocks, a massive cooler, and promises to deliver blazing fast performance vs the standard GTX 1080 Ti. URL - http://www.eteknix.com/asus-rog-strix-gtx-1080-ti-11gb-graphics-card-review/ --
-
*Team Group T-FORCE CARDEA M.2 480GB SSD review* We review the new Group T-FORCE CARDEA M.2 480GB NVMe SSD. This slice of M.2 NAND is fast and even has been fitted with a large heatsink. Will Team Group be able to deliver a unit that manages to impress? Read the full * review here <http://www.guru3d.com/articles-pages/team-group-t-force-cardea-m2-480gb-ssd-review,1.html>'>http://www.guru3d.com/articles-pages/team-group-t-force-cardea-m2-480gb-ssd-review,1.html> *. URL: http://www.guru3d.com/articles-pages/team-group-t-force-cardea-m2-480gb-ssd-review,1.html <http://www.guru3d.com/articles-pages/team-group-t-force-cardea-m2-480gb-ssd-review,1.html> --
-
Welcome to the Ubuntu Weekly Newsletter, Issue 505 for the weeks April 10 - 23, 2017. == Links to UWN == * Wiki page: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/Issue505 == In This Issue == * Ubuntu 17.04 (Zesty Zapus) released * A new vantage point * Ubuntu Membership Board call for nominations * Welcome New Members and Developers * Ubuntu Stats * LoCo Events * Alan Pope: My Ubuntu 16.04 GNOME Setup * Kubuntu Team: KDE PIM update for Zesty available for testers * Ubuntu Cloud News * Canonical News * In The Blogosphere * Featured Audio and Video * Weekly Ubuntu Development Team Meetings * Upcoming Meetings and Events * Updates and Security for 12.04, 14.04, 16.04, and 16.10 * And much more! == General Community News == === Ubuntu 17.04 (Zesty Zapus) released === On behalf of the release team, Adam Conrad announces the release of Ubuntu 17.04 (Zesty Zapus). He shares key features of this release, including a new 4.10-based kernel and other updates in core packages. Links for downloading the release as well as the flavor releases are provided. https://lists.ubuntu.com/archives/ubuntu-announce/2017-April/000220.html The Ubuntu Insights news site also made an announcement of their own: "Ubuntu 17.04 supports widest range of container capabilities" - https://insights.ubuntu.com/2017/04/13/ubuntu-17-04-supports-widest-range-of-container-capabilities/ This release was widely covered, the following is a collection of articles selected by our editors: * Ubuntu 17.04 Now Available For Download - http://www.phoronix.com/scan.php?page=news_item&px=Ubuntu-17.04-Download * Ubuntu 17.04 Available to Download Now, This is What's New - http://www.omgubuntu.co.uk/2017/04/ubuntu-17-04-review-new-features * Ubuntu 17.04 (Zesty Zapus) Officially Released, Available to Download Now - http://news.softpedia.com/news/ubuntu-17-04-zesty-zapus-officially-released-available-to-download-now-514853.shtml * Ubuntu 17.04: The bittersweet Linux release - http://www.zdnet.com/article/ubuntu-17-04-the-bittersweet-linux-release/ === A new vantage point === Jane Silber from Canonical writes about her history working at Canonical and her new role in the near future. She writes, "We're now entering a new phase of accelerated growth at Canonical, and it's time to pass the baton to both seasoned hands and a new generation of Canonical leaders." https://insights.ubuntu.com/2017/04/12/a-new-vantage-point/ This story was also covered by a number of news sites. The following is a collection of articles selected by our editors: * Canonical CEO Jane Silber Resigns - http://www.zdnet.com/article/canonical-ceo-jane-silber-resigns/ * Ubuntu founder makes shock return as Canonical CEO - http://www.cbronline.com/news/enterprise-it/software/ubuntu-founder-makes-shock-return-canonical-ceo/ * Canonical sharpens post-Unity axe for 80-plus Ubuntu spinners - https://www.theregister.co.uk/2017/04/12/80_canonical_staff_face_chop/ === Ubuntu Membership Board call for nominations === Michael Hall from the Ubuntu Community Council announces a call for nominations for the Ubuntu Membership Board. He writes, "We have seven members of our boards expiring from their terms, which means we need to do some restaffing of this Membership Board." He gives details about the board and notes that the nominations will end at Friday, May 26th at 12:00 UTC. http://fridge.ubuntu.com/2017/04/23/ubuntu-membership-board-call-for-nominations-5/ === Welcome New Members and Developers === Robie Basak on behalf of the Ubuntu Developer Membership Board announces the newest MOTU and Per-Package Uploader for postgresql-9.6 and multipath-tools: * Christian Ehrhardt (Launchpad Page: https://launchpad.net/~paelzer) https://lists.ubuntu.com/archives/ubuntu-news-team/2017-April/002647.html == Ubuntu Stats == === Bug Stats === * Open (131416) +468 over last week * Critical (428) -8 over last week * Unconfirmed (65675) +265 over last week As always, the Bug Squad needs more help. If you want to get started, please see https://wiki.ubuntu.com/BugSquad === Ask Ubuntu Top 5 Questions this week === ==== Most Active Questions ==== * Accidentally removed /bin. How do I restore it? http://askubuntu.com/questions/906674/accidentally-removed-bin-how-do-i-restore-it * Is Data Transfer between 2 Ubuntu Machines possible via USB-Cable? http://askubuntu.com/questions/905926/is-data-transfer-between-2-ubuntu-machines-possible-via-usb-cable * How can I stop following output in less, without affecting the command generating the output? http://askubuntu.com/questions/905796/how-can-i-stop-following-output-in-less-without-affecting-the-command-generatin * Why would installing one unity-scope remove ubuntu-desktop? http://askubuntu.com/questions/906314/why-would-installing-one-unity-scope-remove-ubuntu-desktop * Google Chrome won't install on 17.04 [closed] http://askubuntu.com/questions/905780/google-chrome-wont-install-on-17-04 ==== Top Voted New Questions ==== * Accidentally removed /bin. How do I restore it? http://askubuntu.com/questions/906674/ * Is Data Transfer between 2 Ubuntu Machines possible via USB-Cable? http://askubuntu.com/questions/905926/ * Why would installing one unity-scope remove ubuntu-desktop? http://askubuntu.com/questions/906314/ * Does Ubuntu support dynamic swap file sizing? http://askubuntu.com/questions/905668/ * Google Chrome won't install on 17.04 http://askubuntu.com/questions/905780/ Ask (and answer!) questions at http://askubuntu.com == LoCo News == === Ubuntu at OSCON 2017! === Jose Antonio Rey announces that Ubuntu will have a table at OSCON on May 10-11. He lets us know that he is providing ExpoHall Plus passes for anyone who would like to attend. https://lists.ubuntu.com/archives/loco-contacts/2017-April/007201.html == LoCo Events == The following LoCo team events are currently scheduled in the next two weeks: * Encontro Ubuntu-pt ( -at -) Sintra // Lancamento Zesty Zapus, Ubuntu Portugal: http://loco.ubuntu.com/events/ubuntu-pt/3556-encontro-ubuntu-pt- ( -at -) -sintra-//-lancamento-zesty-zapus/ * Sierra Vista Ubuntu Hour, Arizona LoCo Team: http://loco.ubuntu.com/events/ubuntu-arizona/3506-sierra-vista-ubuntu-hour/ * Tempe Ubuntu Hour, Arizona LoCo Team: http://loco.ubuntu.com/events/ubuntu-arizona/3507-tempe-ubuntu-hour/ * Ubuntu Michigan Loco 17.04 Release Party, Ubuntu-Michigan: http://loco.ubuntu.com/events/ubuntu-us-mi/3557-ubuntu-michigan-loco-1704-release-party/ * FLISoL Calabozo 2017, Ubuntu Venezuela Team: http://loco.ubuntu.com/events/ubuntu-ve/3548-flisol-calabozo-2017/ * Tempe Ubuntu Hour, Arizona LoCo Team: http://loco.ubuntu.com/events/ubuntu-arizona/3534-tempe-ubuntu-hour/ * Debian/Ubuntu Community Conference - Italia 2017, Ubuntu Italy: http://loco.ubuntu.com/events/ubuntu-it/3544-debian/ubuntu-community-conference---italia-2017/ * 12th Annual West End Fair, Arizona LoCo Team: http://loco.ubuntu.com/events/ubuntu-arizona/3543-12th-annual-west-end-fair/ * AZLOCO Install-fest/Linux Workshop, Arizona LoCo Team: http://loco.ubuntu.com/events/ubuntu-arizona/3535-azloco-install-fest/linux-workshop/ Looking beyond the next two weeks? Visit the LoCo Team Portal to browse upcoming events around the world: http://loco.ubuntu.com/events/ == The Planet == === Alan Pope: My Ubuntu 16.04 GNOME Setup === Alan Pope writes about his Ubuntu 16.04 GNOME setup. He lists some features he enjoys in Unity, and how he accomplished those same tasks in GNOME. https://popey.com/blog/posts/my-ubuntu-1604-gnome-setup.html === Kubuntu Team: KDE PIM update for Zesty available for testers === The Kubuntu Team announces the availability of an update for KDE PIM for testers. They write, "Since we missed by a whisker getting updated PIM (kontact, kmail, akregator, kgpg etc..) into Zesty for release day, and we believe it is important that our users have access to this significant update, packages are now available for testers in the Kubuntu backports landing ppa." [sic] They give instructions on how to test this release, and where to report any issues. http://www.kubuntu.org/news/kde-pim-update-for-zesty-available-for-testers/ == Ubuntu Cloud News == * Unitas Global and Canonical provide Fully-Managed Enterprise OpenStack - https://insights.ubuntu.com/2017/04/18/unitas-global-and-canonical-provide-fully-managed-enterprise-openstack/ == Canonical News == * The Smartest Industry 4.0 Crane - https://insights.ubuntu.com/2017/04/10/the-smartest-industry-4-0-crane/ * FAQs: Ensuring the ongoing security compliance of Ubuntu - https://insights.ubuntu.com/2017/04/11/faqs-ensuring-the-ongoing-security-compliance-of-ubuntu/ * Snap support lands in Fedora 24, 25 & 26 - https://insights.ubuntu.com/2017/04/11/snap-support-lands-in-fedora-24-25-26/ * General availability of Kubernetes 1.6 on Ubuntu - https://insights.ubuntu.com/2017/04/12/general-availability-of-kubernetes-1-6-on-ubuntu/ * ROS production: our prototype - https://insights.ubuntu.com/2017/04/13/ros-production-our-prototype/ * Ubuntu 17.04 supports widest range of container capabilities - https://insights.ubuntu.com/2017/04/13/ubuntu-17-04-supports-widest-range-of-container-capabilities/ * Industrial IoT - Manage and Control Remote Assets - https://insights.ubuntu.com/2017/04/17/industrial-iot-manage-and-control-remote-assets/ * Unitas Global and Canonical provide Fully-Managed Enterprise openStack - https://insights.ubuntu.com/2017/04/18/unitas-global-and-canonical-provide-fully-managed-enterprise-openstack/ * FTC & D-Link - https://insights.ubuntu.com/2017/04/19/ftc-d-link/ * How we commoditized GPUs for Kubernetes - https://insights.ubuntu.com/2017/04/19/how-we-commoditized-gpus-for-kubernetes/ * Certified Ubuntu Images available on Oracle Bare Metal Cloud Service - https://insights.ubuntu.com/2017/04/20/certified-ubuntu-images-available-on-oracle-bare-metal-cloud-service/ == In The Blogosphere == * UBports Recommends Buying Fairphone 2, OnePlus One or Nexus 5 as Ubuntu Phones - http://news.softpedia.com/news/ubports-recommends-buying-fairphone-2-oneplus-one-or-nexus-5-as-ubuntu-phones-514949.shtml * 5 Developments After Ubuntu Unity Fiasco - https://itsfoss.com/ubuntu-after-unity/ * How Linux Figures Reacted to Ubuntu's Unity Bombshell - http://www.omgubuntu.co.uk/2017/04/ubuntu-unity-new-reaction-roundup * Ubuntu Snaps to Integrate Fully with GNOME and KDE, Says Mark Shuttleworth - http://news.softpedia.com/news/ubuntu-snaps-to-integrate-fully-with-gnome-and-kde-says-mark-shuttleworth-514759.shtml * Ubuntu GNOME To Merge with Ubuntu, Will No Longer Be a Separate Flavor - http://www.omgubuntu.co.uk/2017/04/ubuntu-gnome * Canonical to make Gnome Default Session in Ubuntu 17.10, Likely use Wayland - http://news.softpedia.com/news/canonical-to-make-gnome-default-session-in-ubuntu-17-10-likely-use-wayland-514991.shtml * Ubuntu Is Switching to Wayland - http://www.omgubuntu.co.uk/2017/04/ubuntu-will-run-wayland-default * Ubuntu 16.04 LTS Users Get New Kernel Live Update, 14 Vulnerabilities Patched - http://news.softpedia.com/news/ubuntu-16-04-lts-users-get-new-kernel-live-update-14-vulnerabilities-patched-514910.shtml * Review On Ubuntu Budgie 17.04: Newest Ubuntu Flavor - https://fosspost.org/2017/04/19/ubuntu-budgie-17-04-review/ * Ubuntu To Use Wayland by Default - http://www.omgubuntu.co.uk/2017/04/ubuntu-will-run-wayland-default * This is the Ubuntu 17.10 Release Date - www.omgubuntu.co.uk/2017/04/ubuntu-17-10-release-date * Dell Launches Precision 5720 All-in-One Workstation Powered by Ubuntu 16.04 LTS - http://news.softpedia.com/news/dell-launches-precision-5720-all-in-one-workstation-powered-by-ubuntu-16-04-lts-514958.shtml * Canonical Announces General Availability of Kubernetes 1.6 on Ubuntu 16.04 LTS - http://news.softpedia.com/news/canonical-announces-general-availability-of-kubernetes-1-6-on-ubuntu-16-04-lts-514871.shtml == Featured Audio and Video == === Ubuntu Podcast: S10E06 - Tasty Different Cow === "We discuss soldering the zerostem, review the new Dell XPS 13, share some command line love and go over your feedback. This show was recorded prior to Mark Shuttleworth's announcement about Growing Ubuntu for Cloud and IoT, rather than Phone and convergence. We'll be discussing that news in a future episode of the Ubuntu Podcast." http://ubuntupodcast.org/2017/04/13/s10e06-tasty-different-cow/ === Ubuntu Podcast S10E07 - Black Frail Silver === "We spend some time discussing one rather important topic in the news and that's the announcement of Ubuntu's re-focus from mobile and convergence to the cloud and Internet of Things." http://ubuntupodcast.org/2017/04/20/s10e07-black-frail-silver/ === Ubuntu Testing Day - Ubuntu Budgie === Leo Arias hosts another Ubuntu Testing Day. This testing day features David Mohammed and others from the Ubuntu Budgie team. They talk about how you can test Ubuntu Budgie, and much more! == Weekly Ubuntu Development Team Meetings == * Kernel Team - April 11, 2017 - https://wiki.ubuntu.com/KernelTeam/Newsletter/2017-04-11 * Kernel Team - April 18, 2017 - https://wiki.ubuntu.com/KernelTeam/Newsletter/2017-04-18 * Security Team - April 10, 2017 - https://wiki.ubuntu.com/MeetingLogs/Security/20170410 * Security Team - April 17, 2017 - https://wiki.ubuntu.com/MeetingLogs/Security/20170417 * Server Team - April 18, 2017 - https://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-04-18-16.01.html == Upcoming Meetings and Events == For upcoming meetings and events please visit the calendars at fridge.ubuntu.com: http://fridge.ubuntu.com/calendars/ == Updates and Security for 12.04, 14.04, 16.04, and 16.10 == === Security Updates === * [uSN-3257-1] WebKitGTK+ vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-April/003812.html * [uSN-3258-1] Dovecot vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-April/003813.html * [uSN-3258-2] Dovecot regression - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-April/003814.html * [uSN-3259-1] Bind vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-April/003818.html * [uSN-3261-1] QEMU vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-April/003816.html * [uSN-3262-1] curl vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-April/003817.html * [uSN-3263-1] FreeType vulnerability - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-April/003819.html * [uSN-3260-1] Firefox vulnerabilities - https://lists.ubuntu.com/archives/ubuntu-security-announce/2017-April/003820.html === Ubuntu 12.04 Updates === * adobe-flashplugin 1:20170411.1-0ubuntu0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026409.html * adobe-flashplugin 1:20170411.1-0ubuntu0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026410.html * flashplugin-nonfree 25.0.0.148ubuntu0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026411.html * flashplugin-nonfree 25.0.0.148ubuntu0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026412.html * linux-lts-trusty 3.13.0-117.164~precise1 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026413.html * linux-meta-lts-trusty 3.13.0.117.108 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026414.html * linux-signed-lts-trusty 3.13.0-117.164~precise1 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026415.html * linux-lts-trusty_3.13.0-117.164~precise1_amd64.tar.gz - - https://lists.ubuntu.com/archives/precise-changes/2017-April/026416.html * libnl 1.1-7+deb7u1build0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026417.html * libnl 1.1-7+deb7u1build0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026418.html * bind9 1:9.8.1.dfsg.P1-4ubuntu0.22 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026419.html * bind9 1:9.8.1.dfsg.P1-4ubuntu0.22 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026420.html * radare2 0.9-3+deb7u2build0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026421.html * potrace 1.10-1+deb7u2build0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026422.html * potrace 1.10-1+deb7u2build0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026423.html * radare2 0.9-3+deb7u2build0.12.04.1 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026424.html * freetype 2.4.8-1ubuntu2.5 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026425.html * freetype 2.4.8-1ubuntu2.5 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026426.html * debootstrap 1.0.40~ubuntu0.12 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026427.html * debootstrap 1.0.40~ubuntu0.12 - https://lists.ubuntu.com/archives/precise-changes/2017-April/026428.html End of Life - April 2017 === Ubuntu 14.04 Updates === * linux-lts-xenial 4.4.0-73.94~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024000.html * linux-meta-lts-xenial 4.4.0.73.60 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024001.html * linux-lts-xenial_4.4.0-73.94~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024002.html * linux-signed-lts-xenial 4.4.0-73.94~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024003.html * adobe-flashplugin 1:20170411.1-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024004.html * adobe-flashplugin 1:20170411.1-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024005.html * flashplugin-nonfree 25.0.0.148ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024006.html * flashplugin-nonfree 25.0.0.148ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024007.html * libvirt 1.2.2-0ubuntu13.1.20 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024008.html * linux-lts-xenial 4.4.0-74.95~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024009.html * linux-meta-lts-xenial 4.4.0.74.61 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024010.html * linux-signed-lts-xenial 4.4.0-74.95~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024011.html * linux-lts-xenial_4.4.0-74.95~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024012.html * check-mk 1.2.2p3-1ubuntu0.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024013.html * logrotate 3.8.7-1ubuntu1.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024014.html * jhead 1:2.97-1+deb8u1build0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024015.html * jhead 1:2.97-1+deb8u1build0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024016.html * uvtool 0~bzr92-0ubuntu1.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024017.html * bind9 1:9.9.5.dfsg-3ubuntu0.14 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024018.html * bind9 1:9.9.5.dfsg-3ubuntu0.14 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024019.html * tnef 1.4.9-1+deb8u2build0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024020.html * tnef 1.4.9-1+deb8u2build0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024021.html * snapd 2.24.1~14.04 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024023.html * graphviz 2.36.0-0ubuntu3.2 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024024.html * qemu 2.0.0+dfsg-2ubuntu1.33 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024025.html * firefox 53.0+build6-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024026.html * gcc-mozilla 4.9.4-0ubuntu1~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024027.html * gcc-mozilla 4.9.4-0ubuntu1~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024028.html * qemu 2.0.0+dfsg-2ubuntu1.33 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024029.html * firefox 53.0+build6-0ubuntu0.14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024030.html * freetype 2.5.2-1ubuntu2.7 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024031.html * freetype 2.5.2-1ubuntu2.7 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024032.html * distro-info-data 0.18ubuntu0.7 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024033.html * distro-info-data 0.18ubuntu0.7 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024034.html * distro-info-data 0.18ubuntu0.7 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024035.html * linux-lts-xenial 4.4.0-75.96~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024036.html * linux-lts-xenial_4.4.0-75.96~14.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024037.html * linux-meta-lts-xenial 4.4.0.75.62 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024038.html * linux-signed-lts-xenial 4.4.0-75.96~14.04.1 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024039.html * debootstrap 1.0.59ubuntu0.7 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024040.html * debootstrap 1.0.59ubuntu0.7 - https://lists.ubuntu.com/archives/trusty-changes/2017-April/024041.html End of Life - April 2019 === Ubuntu 16.04 Updates === * dpkg 1.18.4ubuntu1.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016725.html * cinder 2:8.1.1-0ubuntu3 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016726.html * livecd-rootfs 2.408.11 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016727.html * webkit2gtk 2.16.1-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016728.html * webkit2gtk 2.16.1-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016729.html * dovecot 1:2.2.22-1ubuntu2.3 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016730.html * dovecot 1:2.2.22-1ubuntu2.3 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016731.html * cloud-init 0.7.9-90-g61eb03fe-0ubuntu1~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016732.html * linux-aws 4.4.0-1014.23 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016733.html * linux-meta-aws 4.4.0.1014.17 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016734.html * linux-raspi2 4.4.0-1053.60 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016735.html * linux-meta-raspi2 4.4.0.1053.54 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016736.html * linux-snapdragon 4.4.0-1056.60 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016737.html * linux-meta-snapdragon 4.4.0.1056.49 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016738.html * adobe-flashplugin 1:20170411.1-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016739.html * adobe-flashplugin 1:20170411.1-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016740.html * flashplugin-nonfree 25.0.0.148ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016741.html * flashplugin-nonfree 25.0.0.148ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016742.html * dovecot 1:2.2.22-1ubuntu2.4 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016743.html * dovecot 1:2.2.22-1ubuntu2.4 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016744.html * juju-mongodb3.2 3.2.12-0ubuntu1~16.04 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016745.html * rabbitmq-server 3.5.7-1ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016746.html * dnsmasq 2.75-1ubuntu0.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016747.html * nfs-utils 1:1.2.8-9ubuntu12.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016748.html * openvswitch 2.5.2-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016749.html * percona-xtrabackup 2.3.7-0ubuntu0.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016750.html * asterisk 1:13.1.0~dfsg-1.1ubuntu4.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016751.html * linux 4.4.0-74.95 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016752.html * linux-meta 4.4.0.74.80 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016753.html * linux-signed 4.4.0-74.95 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016754.html * linux_4.4.0-74.95_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016755.html * linux-aws 4.4.0-1015.24 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016756.html * linux-meta-aws 4.4.0.1015.18 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016757.html * linux-gke 4.4.0-1012.12 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016758.html * linux-meta-gke 4.4.0.1012.14 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016759.html * linux-hwe 4.8.0-48.51~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016760.html * linux-meta-hwe 4.8.0.48.20 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016761.html * linux-signed-hwe 4.8.0-48.51~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016762.html * linux-hwe_4.8.0-48.51~16.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016763.html * linux-raspi2 4.4.0-1054.61 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016764.html * linux-meta-raspi2 4.4.0.1054.55 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016765.html * linux-snapdragon 4.4.0-1057.61 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016766.html * linux-meta-snapdragon 4.4.0.1057.50 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016767.html * golang-1.6 1.6.2-0ubuntu5~16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016768.html * check-mk 1.2.6p12-1ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016769.html * virtualbox 5.0.36-dfsg-0ubuntu1.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016770.html * virtualbox-guest-additions-iso 5.0.36-0ubuntu1.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016771.html * virtualbox-ext-pack 5.0.36-0ubuntu1.16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016772.html * ntp 1:4.2.8p4+dfsg-3ubuntu5.4 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016773.html * lttng-modules 2.8.0-1ubuntu1~16.04.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016774.html * logrotate 3.8.7-2ubuntu2.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016775.html * bind9 1:9.10.3.dfsg.P4-8ubuntu1.6 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016776.html * bind9 1:9.10.3.dfsg.P4-8ubuntu1.6 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016777.html * tnef 1.4.9-1+deb8u2build0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016778.html * tnef 1.4.9-1+deb8u2build0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016779.html * thermald 1.5-2ubuntu4 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016780.html * cacti 0.8.8f+ds1-4ubuntu4.16.04.3 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016781.html * snapd 2.24.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016782.html * linux-hwe-edge 4.10.0-19.21~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016783.html * linux-signed-hwe-edge 4.10.0-19.21~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016784.html * linux-hwe-edge 4.10.0-19.21~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016785.html * linux-signed-hwe-edge 4.10.0-19.21~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016786.html * linux-meta-hwe-edge 4.10.0.19.12 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016787.html * linux-meta-hwe-edge 4.10.0.19.12 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016788.html * qemu 1:2.5+dfsg-5ubuntu10.11 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016789.html * cloud-init 0.7.9-90-g61eb03fe-0ubuntu1~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016790.html * firefox 53.0+build6-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016791.html * qemu 1:2.5+dfsg-5ubuntu10.11 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016792.html * firefox 53.0+build6-0ubuntu0.16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016793.html * freetype 2.6.1-0.1ubuntu2.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016794.html * freetype 2.6.1-0.1ubuntu2.2 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016795.html * distro-info-data 0.28ubuntu0.3 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016796.html * distro-info-data 0.28ubuntu0.3 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016797.html * distro-info-data 0.28ubuntu0.3 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016798.html * cinder 2:8.1.1-0ubuntu3 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016799.html * dockerpty 0.4.1-1~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016800.html * docker-compose 1.8.0-2~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016801.html * python-docker 1.9.0-1~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016802.html * linux-hwe-edge_4.10.0-19.21~16.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016803.html * linux 4.4.0-75.96 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016804.html * linux-meta 4.4.0.75.81 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016805.html * linux-signed 4.4.0-75.96 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016806.html * linux_4.4.0-75.96_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016807.html * linux-aws 4.4.0-1016.25 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016808.html * linux-meta-aws 4.4.0.1016.19 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016809.html * linux-hwe 4.8.0-49.52~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016810.html * linux-meta-hwe 4.8.0.49.21 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016811.html * linux-signed-hwe 4.8.0-49.52~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016812.html * linux-hwe_4.8.0-49.52~16.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016813.html * linux-hwe-edge 4.10.0-20.22~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016814.html * linux-meta-hwe-edge 4.10.0.20.13 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016815.html * linux-signed-hwe-edge 4.10.0-20.22~16.04.1 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016816.html * linux-hwe-edge_4.10.0-20.22~16.04.1_amd64.tar.gz - - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016817.html * snapcraft 2.29 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016818.html * debootstrap 1.0.78+nmu1ubuntu1.3 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016819.html * debootstrap 1.0.78+nmu1ubuntu1.3 - https://lists.ubuntu.com/archives/xenial-changes/2017-April/016820.html End of Life - April 2021 === Ubuntu 16.10 Updates === * dpkg 1.18.10ubuntu1.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012516.html * webkit2gtk 2.16.1-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012517.html * webkit2gtk 2.16.1-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012518.html * dovecot 1:2.2.24-1ubuntu1.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012519.html * cloud-init 0.7.9-90-g61eb03fe-0ubuntu1~16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012520.html * dovecot 1:2.2.24-1ubuntu1.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012521.html * systemd 231-9ubuntu4 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012522.html * golang-1.6 1.6.3-1ubuntu1.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012523.html * adobe-flashplugin 1:20170411.1-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012524.html * adobe-flashplugin 1:20170411.1-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012525.html * linux-raspi2 4.8.0-1034.37 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012526.html * linux-meta-raspi2 4.8.0.1034.38 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012527.html * flashplugin-nonfree 25.0.0.148ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012528.html * flashplugin-nonfree 25.0.0.148ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012529.html * dovecot 1:2.2.24-1ubuntu1.3 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012530.html * dovecot 1:2.2.24-1ubuntu1.3 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012531.html * dnsmasq 2.76-4ubuntu0.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012532.html * rabbitmq-server 3.5.7-1ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012533.html * percona-xtrabackup 2.3.7-0ubuntu0.16.10.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012534.html * bind9 1:9.10.3.dfsg.P4-10.1ubuntu1.4 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012535.html * linux 4.8.0-48.51 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012536.html * linux-meta 4.8.0.48.60 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012537.html * linux-signed 4.8.0-48.51 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012538.html * linux_4.8.0-48.51_amd64.tar.gz - - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012539.html * linux-raspi2 4.8.0-1035.38 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012540.html * linux-meta-raspi2 4.8.0.1035.39 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012541.html * golang-1.6 1.6.3-1ubuntu1.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012542.html * epiphany-browser 3.22.7-0ubuntu1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012543.html * evolution 3.22.6-0ubuntu0.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012544.html * evolution-data-server 3.22.7-0ubuntu0.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012545.html * cinder 2:9.1.2-0ubuntu2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012546.html * logrotate 3.8.7-2ubuntu2.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012547.html * bind9 1:9.10.3.dfsg.P4-10.1ubuntu1.6 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012548.html * bind9 1:9.10.3.dfsg.P4-10.1ubuntu1.6 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012549.html * gdb 7.11.90.20161005-0ubuntu2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012550.html * tnef 1.4.9-1+deb8u2build0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012551.html * tnef 1.4.9-1+deb8u2build0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012552.html * jasper 1.900.1-debian1-2.4+deb8u3build0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012553.html * thermald 1.5.3-4ubuntu2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012554.html * jasper 1.900.1-debian1-2.4+deb8u3build0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012555.html * cacti 0.8.8h+ds1-5ubuntu0.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012556.html * update-manager 1:16.10.10 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012557.html * snapd 2.24.1+16.10 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012558.html * linux-snapdragon 4.4.0-1055.59 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012559.html * linux-meta-snapdragon 4.4.0.1055.48 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012560.html * linux-meta-snapdragon 4.4.0.1055.48 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012561.html * linux-snapdragon 4.4.0-1055.59 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012562.html * linux-meta-snapdragon 4.4.0.1055.48 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012563.html * linux-snapdragon 4.4.0-1055.59 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012564.html * linux-snapdragon 4.4.0-1057.61 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012565.html * linux-meta-snapdragon 4.4.0.1057.50 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012566.html * pollinate 4.23-0ubuntu1.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012567.html * resolvconf 1.79ubuntu1.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012568.html * qemu 1:2.6.1+dfsg-0ubuntu5.4 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012569.html * cloud-init 0.7.9-90-g61eb03fe-0ubuntu1~16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012570.html * firefox 53.0+build6-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012571.html * firefox 53.0+build6-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012572.html * qemu 1:2.6.1+dfsg-0ubuntu5.4 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012573.html * freetype 2.6.3-3ubuntu1.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012574.html * freetype 2.6.3-3ubuntu1.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012575.html * distro-info-data 0.29ubuntu0.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012576.html * systemd 231-9ubuntu4 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012577.html * distro-info-data 0.29ubuntu0.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012578.html * distro-info-data 0.29ubuntu0.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012579.html * libvirt 2.1.0-1ubuntu9.4 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012580.html * software-properties 0.96.24.7.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012581.html * openvswitch 2.6.1-0ubuntu0.16.10.1 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012582.html * linux 4.8.0-49.52 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012583.html * linux-signed 4.8.0-49.52 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012584.html * linux-meta 4.8.0.49.61 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012585.html * linux_4.8.0-49.52_amd64.tar.gz - - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012586.html * snapcraft 2.29+16.10 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012587.html * debootstrap 1.0.81ubuntu2.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012588.html * debootstrap 1.0.81ubuntu2.2 - https://lists.ubuntu.com/archives/yakkety-changes/2017-April/012589.html End of Life - July 2017 == Subscribe == Get your copy of the Ubuntu Weekly Newsletter delivered each week to you via email at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-news == Archives == You can always find older Ubuntu Weekly Newsletter issues at: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter == Additional Ubuntu News == As always you can find more news and announcements at: http://insights.ubuntu.com/ and http://fridge.ubuntu.com/ == Conclusion == Thank you for reading the Ubuntu Weekly Newsletter. See you next week! == Credits == The Ubuntu Weekly Newsletter is brought to you by: * Simon Quigley * Chris Guiver * Jim Connett * And many others == Glossary of Terms == Other acronyms can be found at https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/glossary == Ubuntu - Get Involved == The Ubuntu community consists of individuals and teams, working on different aspects of the distribution, giving advice and technical support, and helping to promote Ubuntu to a wider audience. No contribution is too small, and anyone can help. It's your chance to get in on all the community fun associated with developing and promoting Ubuntu. http://community.ubuntu.com/contribute/ Or get involved with the Ubuntu Weekly Newsletter team! We always need summary writers and editors, if you're interested, learn more at: https://wiki.ubuntu.com/UbuntuWeeklyNewsletter/Join == Feedback ==
-
AT-SPI 2.25.1 is now available for download at: http://download.gnome.org/sources/at-spi2-core/2.25/ http://download.gnome.org/sources/at-spi2-atk/2.25/ What is AT-SPI2 =============== AT-SPI2 is a D-Bus based accessibility framework. It defines a D-Bus protocol for providing and accessing application accessibility information. The project includes a library for bridging the D-Bus protocol to the ATK API, allowing Gtk based applications to be made accessible. It also contains a client (AT) side library in C and a wrapper for Python. What's changed in AT-SPI 2.25.1 =============== * [core/atk] fixes for atspi_table_cell_get_contents. * [atk] fixed memory use after free when removing from the list of events that are being listened to (bgo#781658). Where can I get more information about AT-SPI2 ============================================== The project wiki is available at: http://www.a11y.org/d-bus How can I contribute to AT-SPI2? ================================ We need help testing with Gnome accessibility technologies, improving performance, and generally tying up loose ends. The above-referenced page contains a list of known issues that should be fixed. IRC : #a11y on Gimpnet E-Mail: accessibility-atspi ( -at -) lists.linux-foundation.org Development repositories can be found at: git://git.gnome.org/pyatspi2 git://git.gnome.org/at-spi2-core git://git.gnome.org/at-spi2-atk _______________________________________________