CEEA-2015:0141 CentOS 6 tzdata Enhancement Update

CentOS Errata and Enhancement Advisory 2015:0141 

Upstream details at : https://rhn.redhat.com/errata/RHEA-2015-0141.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
0eed49ffbfe3a3af9e29e74072531a567cb05578f3050380f04df7e28c093ff7  tzdata-2015a-1.el6.noarch.rpm
4a23515cf9b03dcde28bbf82f516cbd9609433d41d53da53778f3e3cf792c407  tzdata-java-2015a-1.el6.noarch.rpm

x86_64:
0eed49ffbfe3a3af9e29e74072531a567cb05578f3050380f04df7e28c093ff7  tzdata-2015a-1.el6.noarch.rpm
4a23515cf9b03dcde28bbf82f516cbd9609433d41d53da53778f3e3cf792c407  tzdata-java-2015a-1.el6.noarch.rpm

Source:
dc7dc3c9fb0dc563879803d4d6bf14bb84910d12a21905e878a816849fe32ebd  tzdata-2015a-1.el6.src.rpm



CEEA-2015:0141 CentOS 5 tzdata Enhancement Update

CentOS Errata and Enhancement Advisory 2015:0141 

Upstream details at : https://rhn.redhat.com/errata/RHEA-2015-0141.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
44a9932b22ec57dae5c56e3442e6e31e9190e34083358f64600b71798e5b0853  tzdata-2015a-1.el5.i386.rpm
18985fa3cc78d13ab79b081a6836c4648e898587c52e6c74dc5301f437fef77e  tzdata-java-2015a-1.el5.i386.rpm

x86_64:
7c23500ec921b8a55837c4cf5a3d7f4a13d0d759dd4a45b993c5660e092819ea  tzdata-2015a-1.el5.x86_64.rpm
c1a4dc3190482b0d204341fb34f66c40aeb37fa3f9dec0b003835faf6e139455  tzdata-java-2015a-1.el5.x86_64.rpm

Source:
43cb09a77bb5d0ed7cdee1b4dc3f3048ee486d1c67c4fa3dee45dbd0db036550  tzdata-2015a-1.el5.src.rpm



Red Hat Security Advisory 2015-0140-01

Red Hat Security Advisory 2015-0140-01 – The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security Bulletin APSB15-04 listed in the References section. Multiple flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the malicious SWF content.