news
Members-
Content count
80899 -
Joined
-
Last visited
Never -
Days Won
18
Everything posted by news
-
NVIDIA Vulkan Driver Shows Impressive Mad Max Performance Over OpenGL
news posted a topic in Upcoming News
At Phoronix we have posted a new article. A link to this from your site's news section would be greatly appreciated. Title: NVIDIA Vulkan Driver Shows Impressive Mad Max Performance Over OpenGL ( -at -) Phoronix Direct Link: http://www.phoronix.com/vr.php?view=24456 Summary: "Hours ago I posted some RADV vs. RadeonSI results on Mad Max which showed much progress for this first Feral Interactive Vulkan Linux game while the NVIDIA results do show much more impressive performance capabilities with this new graphics API. Here are some of my initial NVIDIA GeForce results for OpenGL vs. Vulkan with Mad Max on Linux while additional tests are on the way. It was just today that Linux game porter Feral Interactive rolled out a public beta of a Vulkan renderer for this originally DX11 Windows game." Please feel free to contact us with any questions or comments you may -
Testing ECC Memory & AMD's Ryzen - A Deep Dive @ Hardware Canucks
news posted a topic in Upcoming News
Hardware Canucks is pleased to present our article where we go deep into testing ECC memory on AMD's Ryzen processors. The results are interesting to say the least. *Article URL:* http://www.hardwarecanucks.com/forum/hardware-canucks-reviews/75030-ecc-memory-amds-ryzen-deep-dive.html *Quote:* *The debate about ECC memory and Ryzen has been raging for the last few weeks. In this article we detail what you can expect right now for ECC compatibility on AMD's Ryzen processors. * We would appreciate it if you would post this in your News section. Regards, -- Hardware Canucks News Team -
WD Black PCIe NVMe SSD Review (512GB) – Does It Live Up To Its Lineage?
news posted a topic in Upcoming News
We have posted a new solid state report!! ------------------------------------------------------------ http://us7.campaign-archive2.com/?u=3d9b6193ffd32dd60e84fc74b&id=30ede40494&e=312ec141fb http://thessdreview.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=2f16d7a866&e=312ec141fb TITLE: WD Black PCIe NVMe SSD Review (512GB) – Does It Live Up To Its Lineage? LINK: http://thessdreview.us7.list-manage1.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=9e3c483300&e=312ec141fb PHOTO: http://thessdreview.us7.list-manage1.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=18b48c99f4&e=312ec141fb INFO: WD Black hard drives have long been the go-to hard drive for many storage consumers. They satisfy the needs of those looking for fast, reliable storage and although they are priced on the high side, they come with a 5-year warranty, which is hard to beat. However, with the release of so many SSDs into the market, WD had been falling behind. Consumers now demand faster storage than what HDDs can offer. WD had no choice but to finally enter the SSD market. Due to this, WD acquired SanDisk, which in turn gave them the necessary tools to make their entrance. After some months of waiting, they finally released their first SSD, the WD Blue SSD (http://thessdreview.us7.list-manage1.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=0926332fd6&e=312ec141fb) . Similarly designed to that of a current generation SanDisk SSD, the WD Blue proved to be a good first go. For many enthusiasts, on the other hand, other SSD manufacturers are in the limelight. There is what seems to be a plethora of PCIe NVMe SSDs in the marketplace, but WD hasn't had anything to show, until now. Back at CES 2017, WD unveiled the latest edition to the WD Black family, the WD Black PCIe (http://thessdreview.us7.list-manage.com/track/click?u=3d9b6193ffd32dd60e84fc74b&id=18551ba74c&e=312ec141fb) . With an M.2 2280 form factor and PCIe NVMe interface, this SSD delivers speeds that are more than three times faster than SATA SSDs and magnitudes faster than a typical HDD. But, will it stand out in the sea of NVMe SSDs or will it fall short of WD's Black brand lineage? Read on as we take a closer look at it in today's review. _________________________________________________________________________________________ -
Philips Brilliance 328P 32" 4K Monitor Review ------------------------------------------------------------ http://us2.campaign-archive1.com/?u=bfb2b902b5fb045ad6f841f98&id=f2ddb47c52&e=872093acb5 http://www.kitguru.net Philips Brilliance 328P 32" 4K Monitor Review The rate of innovation in the PC monitor market over the past two years or so has been, frankly, explosive. Ultra-wide 21:9 aspect panels, curved screens, 4K-plus resolutions, panel sizes of 40 inches and beyond – all of this and more is now routine if not necessarily achievable and affordable in a single screen. Read the review here: http://www.kitguru.net/peripherals/monitors/jeremy-laird/philips-brilliance-328p-32-4k-monitor-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=f2ddb47c52&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
-
Hello editors, Today we're taking a look the MSI X370 XPower Titanium, an X370 chipset motherboard that hopes to bring the best out of AMD's latest Ryzen 7 CPUs. It's almost among the most expensive of X370 motherboard offerings, targeting overclocking enthusiasts who are going to want to make use of built-in features like the 6+4-phase power delivery system and beefy power connections. http://www.neoseeker.com/Articles/Hardware/Reviews/msi-x370-xpower-titanium/ "MSI delivered a feature rich, performance orientated motherboard with the > X370 XPower Gaming Titanium. With support for AMD Ryzen series and 7th Gen > A-series/Athlon processors along with the ability to overclock DDR4 RAM to > 3200+ frequencies, the MSI X370 is looking to be long-term solution for > your rig." Thanks as always for any linkage, we appreciate your support! Neoseeker Hardware http://www.neoseeker.com/ hardware ( -at -) neoseeker.com
-
AMD Ryzen Game Optimization Begins: Ashes Of The Singularity Patched And Tested
news posted a topic in Upcoming News
View this email in your browser (http://us3.campaign-archive1.com/?u=efc4c507c2cf964fc2462caca&id=c7c0f12f49&e=0c004f9c13) AMD captured the attention of PC gamers and performance enthusiasts everywhere with the launch of its Ryzen 7 series processors. The trio of 8-core chips take on Intel's venerable Core i7 series at the high-end of its product stack and forthcoming Ryzen 5 Series CPUs from AMD are expected to compete with Intel's Core i mid-range products. However, with the extra attention and lime light AMD garnered, came significant scrutiny as well. And with any entirely new platform architecture, there are bound to be "corner cases" and a few performance anomalies -- as was the case with the now infamous "1080p gaming" situation with Ryzen. Today, we have some early proof-positive of that Ryzen gaming can be optimized, as Oxide Games, in concert with AMD, released a patch for its title Ashes Of The Singularity. Ashes has been a "poster child" game engine of sorts for AMD Radeon graphics over the years (especially with respect to DX12) and it was one that ironically showed some of the wildest (negative) variations in Ryzen CPU performance versus Intel processors... AMD Ryzen Game Optimization Begins: Ashes Of The Singularity Patched And Tested (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=8766aad7d7&e=0c004f9c13) http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=7943954a0c&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=9bd8d17f1b&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=1ce8818803&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=402b71f629&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=5100c56a91&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=91188c7645&e=0c004f9c13 ============================================================ -
News: Intel defends its process-technology leadership at 14nm and 10nm
news posted a topic in Upcoming News
As process sizes grow smaller and smaller, Intel believes that the true characteristics of those technology advances are being clouded by an over-reliance on a single nanometer figure. At its Technology and Manufacturing Day this week, the company defended its process leadership and proposed fresh metrics that could more accurately describe what a given process is capable of. Read more: http://techreport.com/review/31660/intel-defends-its-process-technology-leadership-at-14nm-and-10nm --- The Tech Report - PC Hardware Explored http://techreport.com -- To unsubscribe from: TR-News, just follow this link: http://node1.techreport.com/cgi-bin/dada/mail.cgi/u/trnews/reviewnews// Click this link, or copy and paste the address into your browser. -
SUSE Security Update: Security update for Linux Kernel Live Patch 19 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0875-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 3.12.61-52_66 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-494=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-494=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_61-52_66-default-3-2.1 kgraft-patch-3_12_61-52_66-xen-3-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_61-52_66-default-3-2.1 kgraft-patch-3_12_61-52_66-xen-3-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 17 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0876-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 3.12.60-52_60 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-506=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-506=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_60-52_60-default-4-2.1 kgraft-patch-3_12_60-52_60-xen-4-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_60-52_60-default-4-2.1 kgraft-patch-3_12_60-52_60-xen-4-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 6 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0877-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 3.12.59-60_45 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-502=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_59-60_45-default-9-2.1 kgraft-patch-3_12_59-60_45-xen-9-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
** TECHSPOT ------------------------------------------------------------ ** MSI GT83VR Titan SLI Review: GTX 1080 SLI! ------------------------------------------------------------ ** http://www.techspot.com/review/1366-msi-gt83vr-titan-sli/ ------------------------------------------------------------ Do you want the most powerful gaming laptop money can buy? Do you also have a spare $5,000 just lying around? Look no further than the MSI GT83VR 7RF Titan SLI, a monster gaming laptop with dual GeForce GTX 1080s inside. This is, quite simply, the most powerful gaming laptop we've tested at TechSpot. Thank you. Julio Franco Executive Editor | TECHSPOT ( -at -) juliofranco ----------------------------------- ============================================================ Our mailing address is: TechSpot 8237 NW 68 St Miami, FL 33166 USA
-
SUSE Security Update: Security update for Linux Kernel Live Patch 5 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0882-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 3.12.59-60_41 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-503=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_59-60_41-default-9-2.1 kgraft-patch-3_12_59-60_41-xen-9-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 14 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0881-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 3.12.60-52_49 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-509=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-509=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_60-52_49-default-8-2.1 kgraft-patch-3_12_60-52_49-xen-8-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_60-52_49-default-8-2.1 kgraft-patch-3_12_60-52_49-xen-8-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
*GeForce GTX 1080 Ti FCAT Frametime Analysis Review* We check out and review the frame-pacing and frametimes with the all new Nvidia GeForce GTX 1080 Ti, will FCAT reveal some stuff we need to know? Read the * article here <http://www.guru3d.com/articles-pages/geforce-gtx-1080-ti-fcat-frametime-analysis-review,1.html>'>http://www.guru3d.com/articles-pages/geforce-gtx-1080-ti-fcat-frametime-analysis-review,1.html> *. URL: http://www.guru3d.com/articles-pages/geforce-gtx-1080-ti-fcat-frametime-analysis-review,1.html <http://www.guru3d.com/articles-pages/geforce-gtx-1080-ti-fcat-frametime-analysis-review,1.html> --
-
SUSE Security Update: Security update for Linux Kernel Live Patch 16 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0889-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 3.12.60-52_57 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-507=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-507=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_60-52_57-default-5-2.1 kgraft-patch-3_12_60-52_57-xen-5-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_60-52_57-default-5-2.1 kgraft-patch-3_12_60-52_57-xen-5-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 13 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0873-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 3.12.55-52_45 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-510=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-510=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_55-52_45-default-8-2.1 kgraft-patch-3_12_55-52_45-xen-8-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_55-52_45-default-8-2.1 kgraft-patch-3_12_55-52_45-xen-8-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 18 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0888-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 3.12.60-52_63 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-505=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-505=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_60-52_63-default-4-2.1 kgraft-patch-3_12_60-52_63-xen-4-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_60-52_63-default-4-2.1 kgraft-patch-3_12_60-52_63-xen-4-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 9 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0887-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 3.12.67-60_64_18 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-499=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_67-60_64_18-default-6-2.1 kgraft-patch-3_12_67-60_64_18-xen-6-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 5 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0885-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 4.4.49-92_11 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-490=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_49-92_11-default-2-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 3 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0878-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 4.4.21-90 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-492=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_21-90-default-4-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 11 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0886-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 3.12.67-60_64_24 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-489=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_67-60_64_24-default-4-2.1 kgraft-patch-3_12_67-60_64_24-xen-4-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 4 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0884-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 4.4.38-93 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-491=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_38-93-default-4-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 15 for SLE 12 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0880-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Server for SAP 12 SUSE Linux Enterprise Server 12-LTSS ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 3.12.60-52_54 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 12: zypper in -t patch SUSE-SLE-SAP-12-2017-508=1 - SUSE Linux Enterprise Server 12-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-2017-508=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Server for SAP 12 (x86_64): kgraft-patch-3_12_60-52_54-default-8-2.1 kgraft-patch-3_12_60-52_54-xen-8-2.1 - SUSE Linux Enterprise Server 12-LTSS (x86_64): kgraft-patch-3_12_60-52_54-default-8-2.1 kgraft-patch-3_12_60-52_54-xen-8-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 1 for SLE 12 SP2 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0867-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 4.4.21-81 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-495=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-4_4_21-81-default-5-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org
-
SUSE Security Update: Security update for Linux Kernel Live Patch 10 for SLE 12 SP1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2017:0868-1 Rating: important References: #1030575 Cross-References: CVE-2017-7184 Affected Products: SUSE Linux Enterprise Live Patching 12 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for the Linux Kernel 3.12.67-60_64_21 fixes one issue. The following security bugs were fixed: - CVE-2017-7184: The XFRM processsing in the Linux kernel 16.10 allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) via an integer overflow, as demonstrated during a Pwn2Own competition at CanSecWest 2017 (bsc#1030575). Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Live Patching 12: zypper in -t patch SUSE-SLE-Live-Patching-12-2017-498=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Live Patching 12 (x86_64): kgraft-patch-3_12_67-60_64_21-default-5-2.1 kgraft-patch-3_12_67-60_64_21-xen-5-2.1 References: https://www.suse.com/security/cve/CVE-2017-7184.html https://bugzilla.suse.com/1030575 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe ( -at -) opensuse.org For additional commands, e-mail: opensuse-security-announce+help ( -at -) opensuse.org