CEBA-2015:0793 CentOS 6 lftp FASTTRACK BugFixUpdate

CentOS Errata and Bugfix Advisory 2015:0793 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-0793.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
b0bd2688031fc57327e6f421c9fbd6c8cd5a8bc0f9b323cb3aae8852f209e4e5  lftp-4.0.9-6.el6.i686.rpm
f3b6f43c1938941dd274558d5f329837530929933aac7fd412b24a7c12b7ce01  lftp-scripts-4.0.9-6.el6.noarch.rpm

x86_64:
b0bd2688031fc57327e6f421c9fbd6c8cd5a8bc0f9b323cb3aae8852f209e4e5  lftp-4.0.9-6.el6.i686.rpm
99f82e33cd92ff9522503f21face4a8df20641a11ff566f0b7a3672958214f30  lftp-4.0.9-6.el6.x86_64.rpm
f3b6f43c1938941dd274558d5f329837530929933aac7fd412b24a7c12b7ce01  lftp-scripts-4.0.9-6.el6.noarch.rpm

Source:
26789a7acc4e980ba85462731a385282621c0689d00d5a1ddad356a7a85aef6f  lftp-4.0.9-6.el6.src.rpm



[ MDVA-2015:008 ] timezone

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Advisory                                   MDVA-2015:008
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : timezone
 Date    : April 8, 2015
 Affected: Business Server 1.0, Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 This is a maintenance and bugfix release that upgrades the timezone
 data packages and the php-timezonedb packages to the 2015b version.
 _______________________________________________________________________

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 3fd2843c03ebd93fc3bebfb72ed74124  mbs1/x86_64/php-timezonedb-2015.2-1.mbs1.x86_64.rpm
 34eea86083b0e4523c3807dff5c30333  mbs1/x86_64/timezone-2015b-1.mbs1.x86_64.rpm
 fdf8a95ee87d80683d7f3c1549237339  mbs1/x86_64/timezone-java-2015b-1.mbs1.x86_64

CVE-2015-0798 (firefox)

The Reader mode feature in Mozilla Firefox before 37.0.1 on Android, and Desktop Firefox pre-release, does not properly handle privileged URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy.

CVE-2015-0799 (firefox)

The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.

CVE-2015-1472 (glibc)

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.

CVE-2015-1473 (glibc)

The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during a risk-management decision for use of the alloca function, which might allow context-dependent attackers to cause a denial of service (segmentation violation) or overwrite memory locations beyond the stack boundary via a long line containing wide characters that are improperly handled in a wscanf call.

CVE-2015-1798 (ntp)

The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.

CVE-2015-1799 (ntp)

The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.

The White House has been hacked

White House hacked

White House deputy national security adviser Ben Rhodes informed about a cyberattack to the White House.

Rhodes told the CNN that hackers gained unauthorized access to the computers non-classified systems and sensitive information, though their classified systems weren’t compromised.

Rhodes wouldn’t confirm or deny if the attack was carried out by Russian hackers or when it happened, but he hinted that it hadn’t been recently. (Wasn’t in the salt couple of days)

Without going into details, during his report he commented that a series of security measures to evaluate and mitigate the damage have been taken.

The post The White House has been hacked appeared first on MediaCenter Panda Security.