Jump to content
Compatible Support Forums

news

Members
  • Content count

    80899
  • Joined

  • Last visited

    Never
  • Days Won

    18

Everything posted by news

  1. Hello Ubuntu Developers, We will soon be going live with a new feature in proposed-migration that emails the uploaders responsible for any packages that have been stuck for longer than a day. The goal is to raise awareness about uploads people have forgotten about, so that they can investigate why they’re stuck and unstick them. When this goes live, it will scan all -proposed packages in all Ubuntu series, and send one email for each package that is currently already stuck in proposed - this will be a large volume of emails but are still important to review. From then on it will only email regarding a newly-stuck package. The mails can be filtered by the header “X-Proposed-Migration: noticeâ€Â, or the subject beginning with “[proposed-migration]â€Â. Thanks! --
  2. CentOS Errata and Bugfix Advisory 2017:0472 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-0472.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 2629f95ec5b436abfe84d0bd0fd0131bc631ae4fdab18b53466fdbbd1a15a11b tzdata-2017a-1.el5.i386.rpm 712ae99e3d37dad1fe54858e8863c71e8be6786f6633cb60a060225e66ba24de tzdata-java-2017a-1.el5.i386.rpm x86_64: 58d0bdf94b0cfb4abea13780d909a74e9d68ed945689f63f1561bdea0c6ed5ee tzdata-2017a-1.el5.x86_64.rpm a767c8d7f0f782394bf6e0dfe5abd4c0999c9176bc139a32a696d1cf4c388478 tzdata-java-2017a-1.el5.x86_64.rpm Source: 02e88e760fe9a2338c9c506c9d4204868da96a3e37f5ac5a8a7436b3c4129a51 tzdata-2017a-1.el5.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: JohnnyCentOS _______________________________________________
  3. CentOS Errata and Enhancement Advisory 2017:0458 Upstream details at : https://rhn.redhat.com/errata/RHEA-2017-0458.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 5d5fd5d8ca7d36045da7cf51014ef923cf0e7ff482f99fa745d5b81babd54d86 kmod-redhat-mpt3sas-14.101.00.00-1.el7_3.x86_64.rpm Source: 13c5b33f5504eb2c4c708fe21111e655ba77e6aff6fc7846cbc30f082a0f2f18 kmod-redhat-mpt3sas-14.101.00.00-1.el7_3.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  4. CentOS Errata and Bugfix Advisory 2017:0472 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-0472.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 466107e89457fc5fb5e4877d28c7526830645f5ac959a51d0b3fc885bc98b876 tzdata-2017a-1.el6.noarch.rpm 4439dfe15e245981524c2fbc8c0928864b4e3da67a761fc0f1b613099c712ac5 tzdata-java-2017a-1.el6.noarch.rpm x86_64: 466107e89457fc5fb5e4877d28c7526830645f5ac959a51d0b3fc885bc98b876 tzdata-2017a-1.el6.noarch.rpm 4439dfe15e245981524c2fbc8c0928864b4e3da67a761fc0f1b613099c712ac5 tzdata-java-2017a-1.el6.noarch.rpm Source: 7d1c14c90c5fdf3cf78f906bf353f7b42bdde64352110fbd98514af1c2ba3c0e tzdata-2017a-1.el6.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  5. CentOS Errata and Enhancement Advisory 2017:0460 Upstream details at : https://rhn.redhat.com/errata/RHEA-2017-0460.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 09b3e71758a143e0aff8ec7669fe75ca87981b1c6a45cb1efe38cf53a54c04b9 nspr-4.13.1-1.0.el7_3.i686.rpm 3a6c20e7132e12ba31fbb56ae97cf0397dc5b512b175454df3f0be34e1acbe72 nspr-4.13.1-1.0.el7_3.x86_64.rpm 4681806392b6fa97ccee438f8452b0c5de023aea3c386bb570b6ad42a31c3329 nspr-devel-4.13.1-1.0.el7_3.i686.rpm 29cef81f1891be05670c3a5f69363b30a8f4e16705edbb75739fa5c4653c706b nspr-devel-4.13.1-1.0.el7_3.x86_64.rpm Source: 7449a93d80a5bb372f618feb8d965cd10806b78d07104eacd716ff6b8692efc7 nspr-4.13.1-1.0.el7_3.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  6. CentOS Errata and Enhancement Advisory 2017:0460 Upstream details at : https://rhn.redhat.com/errata/RHEA-2017-0460.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 4fa594de013548c41deed341d101062104ba382b33a64434e0fd71019db3b106 nss-util-3.28.2-1.1.el7_3.i686.rpm 4ddbdb0cc496c5d6bbe4bbe7edfb1c8a1ebb7d3ae7a3eb90dda8890280048427 nss-util-3.28.2-1.1.el7_3.x86_64.rpm 4ce32703476e615bc9c362c22ee596c23d4c143a63960c8e0919b9faf689be8a nss-util-devel-3.28.2-1.1.el7_3.i686.rpm baad28c5e87dd2126a1bef1e8308f37d30520397f9ba95c5f49adc50f6953628 nss-util-devel-3.28.2-1.1.el7_3.x86_64.rpm Source: bcee8b9c13e01f912a50965455bf4a26f9ecfe98683dee488ccccbc2cb028de8 nss-util-3.28.2-1.1.el7_3.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  7. CentOS Errata and Enhancement Advisory 2017:0460 Upstream details at : https://rhn.redhat.com/errata/RHEA-2017-0460.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: f903ae7228a486794fc475c6f1e5c95b441144e69697ba5915a125b5d0c47eac nss-3.28.2-1.6.el7_3.i686.rpm 997bf50bedd8b277f58b892c5fce32693ce41a1daa0f80cce14c4f348f697d95 nss-3.28.2-1.6.el7_3.x86_64.rpm 9a3bf58c2fdef2f3b099be23603d209dbcbd5f00ef0a4c4777ce3a03f7e0ae2e nss-devel-3.28.2-1.6.el7_3.i686.rpm c10d9e308bccc51e59b3d1d3ab70a1075db1d29eb4afc94df54e10b75d19b4fd nss-devel-3.28.2-1.6.el7_3.x86_64.rpm cb0aedace30812ebd3ddd75dee3f6c1db288c0c46cc7137a939f5c9084bbe3ab nss-pkcs11-devel-3.28.2-1.6.el7_3.i686.rpm e3f1102d8afc25abbd440358269ed353adef67b83a64c75182f116dc88efa5eb nss-pkcs11-devel-3.28.2-1.6.el7_3.x86_64.rpm 11856ae59608ce6385bdef2ad417612a5dd8e5602a645627ae9afcfbe5841253 nss-sysinit-3.28.2-1.6.el7_3.x86_64.rpm 433e4525339e22c5edaf0dbecf47b7d0a95ad3563788074fbc160ee03e1197f8 nss-tools-3.28.2-1.6.el7_3.x86_64.rpm Source: bdc27cc85a0f92d93385bb711f4bc69fbf617dd649d70384be53666e01324d36 nss-3.28.2-1.6.el7_3.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  8. CentOS Errata and Security Advisory 2017:0461 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0461.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 1d0b658fdec4ca46114566017609d05174e57d3a4fe8f2dad5cc4bef31b79565 firefox-52.0-4.el7.centos.i686.rpm 84e4a856f98b3fc61b4185bd1b7e77914ada452c9438379e84f7ea6ee5f63daf firefox-52.0-4.el7.centos.x86_64.rpm Source: e962f4e9d1ca12f273caa044beb279a741c0229cb909c88d2c0a8507b4a6b582 firefox-52.0-4.el7.centos.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  9. CentOS Errata and Bugfix Advisory 2017:0472 Upstream details at : https://rhn.redhat.com/errata/RHBA-2017-0472.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 5466bcb17ce08e9000a2c49c4d794df5b14cb134bd8626c0dd1ee1d8ad5f2487 tzdata-2017a-1.el7.noarch.rpm 96548dc39c746c9d7fd1b31f7c792c8f1b4244f25faac417bfc535905108eac3 tzdata-java-2017a-1.el7.noarch.rpm Source: 1c46024fee2400b239ff093d385e7757d0d63f976a49d9997101b8466b2851ff tzdata-2017a-1.el7.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  10. Dear Editors, we just posted a new article which might be interesting to your readers. A post in your news section would be appreciated. Title: FSP Twins 500 W Redundant PSU Link: https://www.techpowerup.com/reviews/FSP/Twins-500 Brief: The FSP Twins 500 W is a digital redundant server-type PSU that can be housed inside a normal ATX chassis. It offers the hot-swap and redundancy features, but comes at a very high price, and with increased output noise.
  11. CentOS Errata and Security Advisory 2017:0454 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0454.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 0e34501fb214585a504064e6aa4e92d8c6324981104fd7a29edc6f918e5cb238 kmod-kvm-83-277.el5.centos.x86_64.rpm 9ed56a631d250bbda7b31e4a1df28387709f816b5974aa87ab522774273e480c kmod-kvm-debug-83-277.el5.centos.x86_64.rpm 38ddb0118eabc062c89dd5353b3da9f4574d4d03c3bb5dba677200cb5522fcb7 kvm-83-277.el5.centos.x86_64.rpm c96ade4c2185dd18a78fcf51c74fe7a7a916de7e45e339975ba14ec5d394928b kvm-qemu-img-83-277.el5.centos.x86_64.rpm 02aed4ba713b572ba9745a568289cb5c48b30b3f94f512a69b77c51bfc532a00 kvm-tools-83-277.el5.centos.x86_64.rpm Source: 125954ae9f9608b901902f81b2d144fbef70efff0e11a761787324457034832d kvm-83-277.el5.centos.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: JohnnyCentOS _______________________________________________
  12. CentOS Errata and Security Advisory 2017:0459 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0459.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 4bec161eb52a589439c71ed05b1cec02090238945f06c5842c46131c1afdb1aa firefox-45.8.0-2.el6.centos.i686.rpm x86_64: 4bec161eb52a589439c71ed05b1cec02090238945f06c5842c46131c1afdb1aa firefox-45.8.0-2.el6.centos.i686.rpm 5419e8f6cd70aaf324f787f935578562ecb86ffc853fd770a850f87050b7e928 firefox-45.8.0-2.el6.centos.x86_64.rpm Source: d9df8316ea7d9e8656a6a2b5b08270d79726ab2be1959a4fd8cf787bb4a3f4a8 firefox-45.8.0-2.el6.centos.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: ( -at -) JohnnyCentOS _______________________________________________
  13. CentOS Errata and Security Advisory 2017:0459 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2017-0459.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: a34545c9cf03031487401a126491ebd9b070d5ae4939388b5257c0247934edbb firefox-45.8.0-2.el5.centos.i386.rpm x86_64: a34545c9cf03031487401a126491ebd9b070d5ae4939388b5257c0247934edbb firefox-45.8.0-2.el5.centos.i386.rpm 68ced987cc2f967a4d8034f1bce8cd63a8ef8a3213cd20d65b66a18a1ca00977 firefox-45.8.0-2.el5.centos.x86_64.rpm Source: 05f28d258f433afa408773c4cac5d3a96058a6e9e25b4991c2e90764335f89e1 firefox-45.8.0-2.el5.centos.src.rpm -- Johnny Hughes CentOS Project { http://www.centos.org/ } irc: hughesjr, #centos ( -at -) irc.freenode.net Twitter: JohnnyCentOS _______________________________________________
  14. Razer Kraken 7.1 V2 Headset Review ------------------------------------------------------------ http://us2.campaign-archive1.com/?u=bfb2b902b5fb045ad6f841f98&id=43c9e859bc&e=872093acb5 http://www.kitguru.net Razer Kraken 7.1 V2 Headset Review Today we are looking at the Razer Kraken 7.1 V2 headset. The ‘7.1’ part of the name is obviously a reference to the surround-sound capabilities of the Kraken, though it should be noted that this is a virtual solution – the Kraken still features just two drivers and relies on software to provide its surround-sound. Nonetheless, priced at £99.95, does the Kraken offer good value for money? Read the review here: http://www.kitguru.net/tech-news/featured-tech-reviews/dominic-moass/razer-kraken-7-1-v2-headset-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=43c9e859bc&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  15. View this email in your browser (http://us3.campaign-archive1.com/?u=efc4c507c2cf964fc2462caca&id=9a7aa00fb1&e=0c004f9c13) In this episode of HotHardware's Two And A Half Geeks webcast, Marco, Dave and Chris talk AMD Ryzen processors for desktop enthusiasts and gamers, AMD's Naples server platform based on the Zen architecture, NVIDIA's GeForce GTX 1080 Ti, LG's hot new G6 Android flagship, the HP Elite x3 phone that proposes to deliver a Windows Office in your pocket, EVGA's innovative iCX cooling for graphics cards, Dell's XPS 15 with GeForce 10 and more! Two And A Half Geeks Webcast! 3/8/2017 Ryzen, Naples, GTX 1080Ti, LG G6, HP Elite x3 And More (http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=a05ca3c03d&e=0c004f9c13) http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=ae6e409145&e=0c004f9c13 http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=e66ec4b1f8&e=0c004f9c13 Best Regards, HotHardware.com (http://hothardware.us3.list-manage2.com/track/click?u=efc4c507c2cf964fc2462caca&id=76a44224a8&e=0c004f9c13) http://hothardware.us3.list-manage1.com/track/click?u=efc4c507c2cf964fc2462caca&id=cefb795b65&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=1ab924965a&e=0c004f9c13 http://hothardware.us3.list-manage.com/track/click?u=efc4c507c2cf964fc2462caca&id=28c2b02289&e=0c004f9c13 ============================================================
  16. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2017:0461-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0461.html Issue date: 2017-03-08 CVE Names: CVE-2017-5398 CVE-2017-5400 CVE-2017-5401 CVE-2017-5402 CVE-2017-5404 CVE-2017-5405 CVE-2017-5407 CVE-2017-5408 CVE-2017-5410 ===================================================================== 1. Summary: An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 52.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5405) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Nils, Jerri Rice, Rh0, Anton Eliasson, David Kohlbrenner, Ivan Fratric of Google Project Zero, Anonymous, Eric Lawrence of Chrome Security, Boris Zbarsky, Christian Holler, Honza Bambas, Jon Coppeard, Randell Jesup, André Bargull, Kan-Ru Chen, and Nathan Froyd as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Firefox must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1429778 - CVE-2017-5400 Mozilla: asm.js JIT-spray bypass of ASLR and DEP (MFSA 2017-06) 1429779 - CVE-2017-5401 Mozilla: Memory Corruption when handling ErrorResult (MFSA 2017-06) 1429780 - CVE-2017-5402 Mozilla: Use-after-free working with events in FontFace objects (MFSA 2017-06) 1429781 - CVE-2017-5404 Mozilla: Use-after-free working with ranges in selections (MFSA 2017-06) 1429782 - CVE-2017-5407 Mozilla: Pixel and history stealing via floating-point timing side channel with SVG filters (MFSA 2017-06) 1429783 - CVE-2017-5410 Mozilla: Memory corruption during JavaScript garbage collection incremental sweeping (MFSA 2017-06) 1429784 - CVE-2017-5408 Mozilla: Cross-origin reading of video captions in violation of CORS (MFSA 2017-06) 1429785 - CVE-2017-5405 Mozilla: FTP response codes can cause use of uninitialized values for ports (MFSA 2017-06) 1429786 - CVE-2017-5398 Mozilla: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8 (MFSA 2017-06) 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: firefox-52.0-4.el7_3.src.rpm x86_64: firefox-52.0-4.el7_3.x86_64.rpm firefox-debuginfo-52.0-4.el7_3.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: firefox-52.0-4.el7_3.i686.rpm firefox-debuginfo-52.0-4.el7_3.i686.rpm Red Hat Enterprise Linux Server (v. 7): Source: firefox-52.0-4.el7_3.src.rpm aarch64: firefox-52.0-4.el7_3.aarch64.rpm firefox-debuginfo-52.0-4.el7_3.aarch64.rpm ppc64: firefox-52.0-4.el7_3.ppc64.rpm firefox-debuginfo-52.0-4.el7_3.ppc64.rpm ppc64le: firefox-52.0-4.el7_3.ppc64le.rpm firefox-debuginfo-52.0-4.el7_3.ppc64le.rpm s390x: firefox-52.0-4.el7_3.s390x.rpm firefox-debuginfo-52.0-4.el7_3.s390x.rpm x86_64: firefox-52.0-4.el7_3.x86_64.rpm firefox-debuginfo-52.0-4.el7_3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): ppc64: firefox-52.0-4.el7_3.ppc.rpm firefox-debuginfo-52.0-4.el7_3.ppc.rpm s390x: firefox-52.0-4.el7_3.s390.rpm firefox-debuginfo-52.0-4.el7_3.s390.rpm x86_64: firefox-52.0-4.el7_3.i686.rpm firefox-debuginfo-52.0-4.el7_3.i686.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: firefox-52.0-4.el7_3.src.rpm x86_64: firefox-52.0-4.el7_3.x86_64.rpm firefox-debuginfo-52.0-4.el7_3.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: firefox-52.0-4.el7_3.i686.rpm firefox-debuginfo-52.0-4.el7_3.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-5398 https://access.redhat.com/security/cve/CVE-2017-5400 https://access.redhat.com/security/cve/CVE-2017-5401 https://access.redhat.com/security/cve/CVE-2017-5402 https://access.redhat.com/security/cve/CVE-2017-5404 https://access.redhat.com/security/cve/CVE-2017-5405 https://access.redhat.com/security/cve/CVE-2017-5407 https://access.redhat.com/security/cve/CVE-2017-5408 https://access.redhat.com/security/cve/CVE-2017-5410 https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/en-US/security/advisories/mfsa2017-06 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYwDECXlSAg2UNWIIRAhVbAJ0c/ktwnZJnJ4uvRFmys3PXJWfV2ACfSSu1 VdCJR8sX8trAF3L6yWo1lPY= =v6Wf -----END PGP SIGNATURE----- --
  17. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: firefox security update Advisory ID: RHSA-2017:0459-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0459.html Issue date: 2017-03-08 CVE Names: CVE-2017-5398 CVE-2017-5400 CVE-2017-5401 CVE-2017-5402 CVE-2017-5404 CVE-2017-5405 CVE-2017-5407 CVE-2017-5408 CVE-2017-5410 ===================================================================== 1. Summary: An update for firefox is now available for Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64 3. Description: Mozilla Firefox is an open source web browser. This update upgrades Firefox to version 45.8.0 ESR. Security Fix(es): * Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5405) Red Hat would like to thank the Mozilla project for reporting these issues. Upstream acknowledges Nils, Jerri Rice, Rh0, Anton Eliasson, David Kohlbrenner, Ivan Fratric of Google Project Zero, Anonymous, Eric Lawrence of Chrome Security, Boris Zbarsky, Christian Holler, Honza Bambas, Jon Coppeard, Randell Jesup, André Bargull, Kan-Ru Chen, and Nathan Froyd as the original reporters. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 After installing the update, Firefox must be restarted for the changes to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1429778 - CVE-2017-5400 Mozilla: asm.js JIT-spray bypass of ASLR and DEP (MFSA 2017-06) 1429779 - CVE-2017-5401 Mozilla: Memory Corruption when handling ErrorResult (MFSA 2017-06) 1429780 - CVE-2017-5402 Mozilla: Use-after-free working with events in FontFace objects (MFSA 2017-06) 1429781 - CVE-2017-5404 Mozilla: Use-after-free working with ranges in selections (MFSA 2017-06) 1429782 - CVE-2017-5407 Mozilla: Pixel and history stealing via floating-point timing side channel with SVG filters (MFSA 2017-06) 1429783 - CVE-2017-5410 Mozilla: Memory corruption during JavaScript garbage collection incremental sweeping (MFSA 2017-06) 1429784 - CVE-2017-5408 Mozilla: Cross-origin reading of video captions in violation of CORS (MFSA 2017-06) 1429785 - CVE-2017-5405 Mozilla: FTP response codes can cause use of uninitialized values for ports (MFSA 2017-06) 1429786 - CVE-2017-5398 Mozilla: Memory safety bugs fixed in Firefox 52 and Firefox ESR 45.8 (MFSA 2017-06) 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: firefox-45.8.0-2.el5_11.src.rpm i386: firefox-45.8.0-2.el5_11.i386.rpm firefox-debuginfo-45.8.0-2.el5_11.i386.rpm x86_64: firefox-45.8.0-2.el5_11.i386.rpm firefox-45.8.0-2.el5_11.x86_64.rpm firefox-debuginfo-45.8.0-2.el5_11.i386.rpm firefox-debuginfo-45.8.0-2.el5_11.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: firefox-45.8.0-2.el5_11.src.rpm i386: firefox-45.8.0-2.el5_11.i386.rpm firefox-debuginfo-45.8.0-2.el5_11.i386.rpm ppc: firefox-45.8.0-2.el5_11.ppc64.rpm firefox-debuginfo-45.8.0-2.el5_11.ppc64.rpm s390x: firefox-45.8.0-2.el5_11.s390.rpm firefox-45.8.0-2.el5_11.s390x.rpm firefox-debuginfo-45.8.0-2.el5_11.s390.rpm firefox-debuginfo-45.8.0-2.el5_11.s390x.rpm x86_64: firefox-45.8.0-2.el5_11.i386.rpm firefox-45.8.0-2.el5_11.x86_64.rpm firefox-debuginfo-45.8.0-2.el5_11.i386.rpm firefox-debuginfo-45.8.0-2.el5_11.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: firefox-45.8.0-2.el6_8.src.rpm i386: firefox-45.8.0-2.el6_8.i686.rpm firefox-debuginfo-45.8.0-2.el6_8.i686.rpm x86_64: firefox-45.8.0-2.el6_8.x86_64.rpm firefox-debuginfo-45.8.0-2.el6_8.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): x86_64: firefox-45.8.0-2.el6_8.i686.rpm firefox-debuginfo-45.8.0-2.el6_8.i686.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: firefox-45.8.0-2.el6_8.src.rpm x86_64: firefox-45.8.0-2.el6_8.i686.rpm firefox-45.8.0-2.el6_8.x86_64.rpm firefox-debuginfo-45.8.0-2.el6_8.i686.rpm firefox-debuginfo-45.8.0-2.el6_8.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: firefox-45.8.0-2.el6_8.src.rpm i386: firefox-45.8.0-2.el6_8.i686.rpm firefox-debuginfo-45.8.0-2.el6_8.i686.rpm ppc64: firefox-45.8.0-2.el6_8.ppc64.rpm firefox-debuginfo-45.8.0-2.el6_8.ppc64.rpm s390x: firefox-45.8.0-2.el6_8.s390x.rpm firefox-debuginfo-45.8.0-2.el6_8.s390x.rpm x86_64: firefox-45.8.0-2.el6_8.x86_64.rpm firefox-debuginfo-45.8.0-2.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): ppc64: firefox-45.8.0-2.el6_8.ppc.rpm firefox-debuginfo-45.8.0-2.el6_8.ppc.rpm s390x: firefox-45.8.0-2.el6_8.s390.rpm firefox-debuginfo-45.8.0-2.el6_8.s390.rpm x86_64: firefox-45.8.0-2.el6_8.i686.rpm firefox-debuginfo-45.8.0-2.el6_8.i686.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: firefox-45.8.0-2.el6_8.src.rpm i386: firefox-45.8.0-2.el6_8.i686.rpm firefox-debuginfo-45.8.0-2.el6_8.i686.rpm x86_64: firefox-45.8.0-2.el6_8.x86_64.rpm firefox-debuginfo-45.8.0-2.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): x86_64: firefox-45.8.0-2.el6_8.i686.rpm firefox-debuginfo-45.8.0-2.el6_8.i686.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2017-5398 https://access.redhat.com/security/cve/CVE-2017-5400 https://access.redhat.com/security/cve/CVE-2017-5401 https://access.redhat.com/security/cve/CVE-2017-5402 https://access.redhat.com/security/cve/CVE-2017-5404 https://access.redhat.com/security/cve/CVE-2017-5405 https://access.redhat.com/security/cve/CVE-2017-5407 https://access.redhat.com/security/cve/CVE-2017-5408 https://access.redhat.com/security/cve/CVE-2017-5410 https://access.redhat.com/security/updates/classification/#critical https://www.mozilla.org/en-US/security/advisories/mfsa2017-06 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYwDESXlSAg2UNWIIRAnjwAKCdfWTRC98zhFV8g4cN9y2iLmZA1ACfbhez PNgicWgxJKDjkzmbQWkBwY4= =9w9S -----END PGP SIGNATURE----- --
  18. Hello LanOC Affiliates and newsletter subscribers, here is our newest posting. We would appreciate you spreading the word! LanOC Reviews has released a new article which you and your readers might enjoy. We would be grateful if you would please share it with them. *TITLE:* MSI GTX 1060 Aero ITX 6G OC ( -at -) LanOC Reviews <https://lanoc.org/review/video-cards/7464-msi-gtx-1060-aero-itx-6g-oc> *DESCRIPTION:* When it comes to LAN rigs, there are some cases that support full sized cards, but when getting into the smallest options they need shorter ITX sized cards. Over the past few years, these options have been opening up, especially with the GTX 1060’s where the cooling and power requirements are a little lower but the performance is still what people are looking for. I’ve had the chance to check out one ITX sized 1060 back at launch and one that was close as well. Well MSI is introducing their new Aero ITX lineup with a GTX 1050 Ti, GTX 1060, and a GTX 1070. Today we have the chance to check out the GTX 1060 so I’m going to see what MSI is doing differently and then find out how it compares to the competition. Is this the card for your LAN rig as we get close to all of the spring events? Let’s find out. *ARTICLE URL:* https://lanoc.org/review/video-cards/7464-msi-gtx-1060-aero-itx-6g-oc *LARGE IMAGE URL:* https://lanoc.org/images/reviews/2017/msi_gtx_1060_aero_6g/title.jpg *SMALL IMAGE URL:* https://lanoc.org/images/reviews/2017/msi_gtx_1060_aero_6g/email.jpg Thank you for your help Our content is syndicated by *RSS* 2.0 at: http://lanoc.org/review?fo rmat=feed&type=atom Check out our *YouTube* Channel: http://www.youtube.com/user/LanocReviews Follow us on *Twitter*: http://www.twitter.com/LanOC_Reviews Join our group on *Facebook*: http://www.facebook.com/LanOCReviews Join our *Steam* Group: http://steamcommunity.com/groups/lanoc *If this message has been sent to an incorrect address, or you no longer wish to receive our news, please email us back and let us know at reviews ( -at -) lanoc.org* ---------------------------------------- Wes Compton Editor-in-Chief LanOC Reviews http://lanoc.org ( -at -) LanOC_Reviews <http://twitter.com/#!/LanOC_Reviews> Google Plus <https://plus.google.com/u/1/b/111054267662763089650/> Our Facebook Page <http://www.facebook.com/LanOCReviews>
  19. Fnatic Gear Clutch G1 Mouse Review ------------------------------------------------------------ http://us2.campaign-archive2.com/?u=bfb2b902b5fb045ad6f841f98&id=2cf35923ae&e=872093acb5 http://www.kitguru.net Fnatic Gear Clutch G1 Mouse Review Towards the end of 2016 we saw a lot of ‘all-singing, all-dancing’ mice, packed with features and multiple RGB lighting zones. However, such a design is not for everyone – which is where the Fnatic Gear Clutch G1 comes in. The Clutch G1 is designed to be a simple mouse that ‘just works’, offering top performance first-and-foremost. With its price of £59.99 it looks to offer reasonable value as well. Read the review here: http://www.kitguru.net/peripherals/mouse/dominic-moass/fnatic-gear-clutch-g1-mouse-review/ ============================================================ ** follow on Twitter (http://twitter.com/#!/kitgurupress) | ** friend on Facebook (http://www.facebook.com/pages/KitGuru/162236020510911) | ** forward to a friend (http://us2.forward-to-friend.com/forward?u=bfb2b902b5fb045ad6f841f98&id=2cf35923ae&e=872093acb5) Copyright © 2017 KitGuru, All rights reserved. You are receiving this because you are a news partner or have signed up to receive our news.
  20. Ghost Recon: Wildlands PC graphics performance benchmark review In this benchmark review we take Ghost Recon: Wildlands for the PC for a test ride. We'll test the game on the PC platform relative towards graphics card performance with the latest AMD/NVIDIA graphics card drivers. Multiple graphics cards are being tested and benchmarked. We have a look at performance with the newest graphics cards and technologies. Read the article right here <http://www.guru3d.com/articles_pages/ghost_recon_wildlands_pc_graphics_performance_benchmark_review,1.html>'>http://www.guru3d.com/articles_pages/ghost_recon_wildlands_pc_graphics_performance_benchmark_review,1.html> . URL: http://www.guru3d.com/articles_pages/ghost_recon_wildlands_pc_graphics_performance_benchmark_review,1.html <http://www.guru3d.com/articles_pages/ghost_recon_wildlands_pc_graphics_performance_benchmark_review,1.html> --
  21. Ghost Recon: Wildlands PC graphics performance benchmark review In this benchmark review we take Ghost Recon: Wildlands for the PC for a test ride. We'll test the game on the PC platform relative towards graphics card performance with the latest AMD/NVIDIA graphics card drivers. Multiple graphics cards are being tested and benchmarked. We have a look at performance with the newest graphics cards and technologies. Read the article right here <http://www.guru3d.com/articles_pages/ghost_recon_wildlands_pc_graphics_performance_benchmark_review,1.html>'>http://www.guru3d.com/articles_pages/ghost_recon_wildlands_pc_graphics_performance_benchmark_review,1.html> . URL: http://www.guru3d.com/articles_pages/ghost_recon_wildlands_pc_graphics_performance_benchmark_review,1.html <http://www.guru3d.com/articles_pages/ghost_recon_wildlands_pc_graphics_performance_benchmark_review,1.html> --
  22. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: java-1.8.0-ibm security update Advisory ID: RHSA-2017:0462-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0462.html Issue date: 2017-03-08 CVE Names: CVE-2016-2183 ===================================================================== 1. Summary: An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 6 Supplementary and Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Supplementary (v. 6) - x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 7) - x86_64 3. Description: IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR4-FP1. Security Fix(es): * This update fixes a vulnerability in the IBM Java Runtime Environment and the IBM Java Software Development Kit. Further information about this flaw can be found on the IBM Java Security alerts page, listed in the References section. (CVE-2016-2183) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of IBM Java must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1369383 - CVE-2016-2183 SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32) 6. Package List: Red Hat Enterprise Linux Desktop Supplementary (v. 6): i386: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.i686.rpm x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux HPC Node Supplementary (v. 6): x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 6): i386: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.i686.rpm ppc64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.ppc64.rpm s390x: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.s390x.rpm x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 6): i386: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.i686.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.i686.rpm x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.1.el6_8.x86_64.rpm Red Hat Enterprise Linux Client Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 7): ppc64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.ppc.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.ppc.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.2.el7.ppc64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.ppc64.rpm ppc64le: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.ppc64le.rpm s390x: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.s390.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.s390x.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.s390x.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.s390.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.s390x.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.s390x.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.s390x.rpm x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.i686.rpm java-1.8.0-ibm-devel-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.4.1-1jpp.2.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.4.1-1jpp.2.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-2183 https://access.redhat.com/security/updates/classification/#moderate https://developer.ibm.com/javasdk/support/security-vulnerabilities/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYwAfWXlSAg2UNWIIRApdJAJ9aWdfCBOWjqVaBLGFXAtS6LJvZXACgkneE 4LO+U1cfPB3cdxvKJ71gfCg= =89qB -----END PGP SIGNATURE----- --
  23. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] mozilla-firefox (SSA:2017-066-01) New mozilla-firefox packages are available for Slackware 14.1, 14.2, and -current to fix security issues. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/mozilla-firefox-45.8.0esr-i586-1_slack14.2.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/mozilla-firefox-45.8.0esr-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/mozilla-firefox-45.8.0esr-x86_64-1_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/mozilla-firefox-45.8.0esr-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/mozilla-firefox-45.8.0esr-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/mozilla-firefox-52.0-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/mozilla-firefox-52.0-x86_64-1.txz MD5 signatures: +-------------+ Slackware 14.1 package: 57fde37f879a9acf9ae4ab820a84c561 mozilla-firefox-45.8.0esr-i486-1_slack14.1.txz Slackware x86_64 14.1 package: ec2075612a375a44dfe149cf1d2327b9 mozilla-firefox-45.8.0esr-x86_64-1_slack14.1.txz Slackware 14.2 package: 1276d25f90e00722d925351b9a53c18e mozilla-firefox-45.8.0esr-i586-1_slack14.2.txz Slackware x86_64 14.2 package: 274720d8d059315a3799169f80cb71f1 mozilla-firefox-45.8.0esr-x86_64-1_slack14.2.txz Slackware -current package: d839c37e35c48992d31573f30d92c860 xap/mozilla-firefox-52.0-i586-1.txz Slackware x86_64 -current package: ad2cdbb3f90ee7381a007b179c723cf1 xap/mozilla-firefox-52.0-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg mozilla-firefox-45.8.0esr-i586-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
  24. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] mozilla-thunderbird (SSA:2017-066-02) New mozilla-thunderbird packages are available for Slackware 14.1, 14.2, and -current to fix security issues. Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/mozilla-thunderbird-45.8.0-i586-1_slack14.2.txz: Upgraded. This release contains security fixes and improvements. For more information, see: https://www.mozilla.org/security/known-vulnerabilities/thunderbird.html (* Security fix *) +--------------------------+ Where to find the new packages: +-----------------------------+ Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/mozilla-thunderbird-45.8.0-i486-1_slack14.1.txz Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/mozilla-thunderbird-45.8.0-x86_64-1_slack14.1.txz Updated package for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/mozilla-thunderbird-45.8.0-i586-1_slack14.2.txz Updated package for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/mozilla-thunderbird-45.8.0-x86_64-1_slack14.2.txz Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/mozilla-thunderbird-45.8.0-i586-1.txz Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/mozilla-thunderbird-45.8.0-x86_64-1.txz MD5 signatures: +-------------+ Slackware 14.1 package: 7b33da87ec7c425c2ac2856c97f429fa mozilla-thunderbird-45.8.0-i486-1_slack14.1.txz Slackware x86_64 14.1 package: 5ee80c367181c91f3a89247665a55f69 mozilla-thunderbird-45.8.0-x86_64-1_slack14.1.txz Slackware 14.2 package: 1872ab97555f95e802288bb56e0be1ed mozilla-thunderbird-45.8.0-i586-1_slack14.2.txz Slackware x86_64 14.2 package: 7b4d998e6d8cad92f9182552478c5cb7 mozilla-thunderbird-45.8.0-x86_64-1_slack14.2.txz Slackware -current package: d5ab8e05e131905e97fdad153174ee37 xap/mozilla-thunderbird-45.8.0-i586-1.txz Slackware x86_64 -current package: f8eebd66ee04ccbf6a1384962a326f54 xap/mozilla-thunderbird-45.8.0-x86_64-1.txz Installation instructions: +------------------------+ Upgrade the package as root: # upgradepkg mozilla-thunderbird-45.8.0-i586-1_slack14.2.txz +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security ( -at -) slackware.com +------------------------------------------------------------------------+
  25. http://benchmarkreviews.us10.list-manage1.com/track/click?u=9a2f239b17114c9008e3dfda9&id=b4a78cb5f6&e=8138df6da5 ** Benchmark Reviews Presents: ------------------------------------------------------------ TITLE: ADATA SU800 SSD Ultimate Review (http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=2b68f916e4&e=8138df6da5) QUOTE: The ADATA SU800 SSD is a 2.5″ solid state drive for the ever-popular SATA 6Gb/s interface found on mainstream desktop and notebook PCs. ADATA promises 560 MB/s read and 520 MB/s write speeds with their new 3D NAND technology, allowing Ultimate SU800 to deliver higher storage density and reliability than ever before. SU800 also features intelligent SLC caching, a DRAM cache buffer to boost transfer performance, and Low-Density Parity Check ECC. In this article for Benchmark Reviews, we test the 512GB ADATA SSD Ultimate SU800 against the competition. LINK: http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=e78108678c&e=8138df6da5 IMAGE: http://benchmarkreviews.us10.list-manage.com/track/click?u=9a2f239b17114c9008e3dfda9&id=7603014912&e=8138df6da5 ============================================================
×