CentOS Errata and Bugfix Advisory 2015:0948 Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-0948.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 4e3ff89b57a17cf454d0c67871025fcea42019d070cf2428f9a8f17e7363b6da ca-certificates-2015.2.4-65.0.1.el6_6.noarch.rpm x86_64: 4e3ff89b57a17cf454d0c67871025fcea42019d070cf2428f9a8f17e7363b6da ca-certificates-2015.2.4-65.0.1.el6_6.noarch.rpm Source: 61474809d52015e8d4e557b2d1e6754f8e70ebaf926e830704695635ca991cf1 ca-certificates-2015.2.4-65.0.1.el6_6.src.rpm
Monthly Archives: May 2015
AVG Acquires Privax, a Global Leader in Personal Privacy Solutions
AMSTERDAM – May 6, 2015 – AVG® Technologies N.V. (NYSE: AVG), the online security company™ for more than 200 million monthly active users, today announced the acquisition of Privax, a leading global provider of desktop and mobile privacy services for consumers. With the acquisition, AVG will add Privax’s HMA! Pro VPN to its existing portfolio of security software and services that will be immediately made available to AVG’s global customer base.
Privax has more than 250,000 paying subscribers worldwide using its VPN encryption service, while its popular free web-based browser proxy service regularly attracts a global audience of over eight million unique visitors per month. The acquisition of Privax further strengthens AVG’s expanding mobile security offerings by providing a proven, privacy subscription service that is available immediately and will also be integrated into future AVG products including AVG Zen.
“Privacy is the new currency of the digital era, particularly as the Internet population is expected to double over the next five years,” said Gary Kovacs, Chief Executive Officer, AVG Technologies. “As we connect through more and more devices, our privacy is becoming increasingly violated. At AVG, we fundamentally believe that it is a user’s choice of how and when to share their private information. With this acquisition, we will immediately be able to provide new and innovative privacy and security services to hundreds of millions of users world-wide.”
Privax leading solutions will continue to be made available directly from Privax and additionally with our proven track record we will distribute through AVG’s consumer and SMB channels.
“Our mission at HMA! has always been to be the go-to tool for anyone who wants to surf the web freely, privately and securely. I’m incredibly proud that our service has done just that, and has been used by tens of millions of people all over the world,” said Jack Cator, Founder and Chief Executive Officer, Privax. “We are thrilled to be teaming up with AVG Technologies to help us accelerate our ambition to be the biggest and best privacy company in the world.”
Under the terms of the agreement, AVG paid $40 million and will pay up to an additional $20 million in cash consideration one year after closing based on the achievement of certain performance metrics and milestones. AVG will present additional financial details at the upcoming Analyst day at the NYSE on May 12th.
![]()
![]()
Fedora 21 Security Update: t1utils-1.39-1.fc21
Resolved Bugs
1218365 – t1utils: buffer overflow flaw
1218366 – t1utils: buffer overflow flaw [fedora-all]<br
t1utils Version 1.39 (2015-02-26)
=================================
* t1disasm: Security fixes for buffer overrun reported by Jakub Wilk and Niels Thykier.
t1utils Version 1.38 (2013-09-29)
=================================
* t1disasm: Fix an infinite loop on some fonts reported by Niels Thykier.
Fedora 21 Security Update: NetworkManager-0.9.10.2-4.fc21
Resolved Bugs
1203904 – NetworkManager-openvpn uses 100% CPU
1168573 – nmcli doesn’t indicate when Wi-Fi plugin is missing
1209903 – CVE-2015-2924 NetworkManager: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements [fedora-all]
1202729 – NetworkManager dbus-glib broken dependency in Fedora 21
1161232 – NetworkManager split dns with DNSMasq not working with VPN
1209902 – CVE-2015-2924 NetworkManager: denial of service (DoS) attack against IPv6 network stacks due to improper handling of Router Advertisements
1205195 – _nl_get_vtable: assertion ‘vtable.handle’ failed<br
This update for NetworkManager fixes a number of bugs and a low-impact security issue for IPv6.
Fedora 22 Security Update: t1utils-1.39-1.fc22
Resolved Bugs
1218366 – t1utils: buffer overflow flaw [fedora-all]
1218365 – t1utils: buffer overflow flaw<br
t1utils Version 1.39 (2015-02-26)
=================================
* t1disasm: Security fixes for buffer overrun reported by Jakub Wilk and Niels Thykier.
t1utils Version 1.38 (2013-09-29)
=================================
* t1disasm: Fix an infinite loop on some fonts reported by Niels Thykier.
Fedora 21 Security Update: libssh-0.6.5-1.fc21
Resolved Bugs
1218076 – CVE-2015-3146 libssh: null pointer dereference due to a logical error in the handling of a SSH_MSG_NEWKEYS and KEXDH_REPLY packets [fedora-all]
1213775 – CVE-2015-3146 libssh: null pointer dereference due to a logical error in the handling of a SSH_MSG_NEWKEYS and KEXDH_REPLY packets<br
Security fix for CVE-2015-3146
Fedora 22 Security Update: libssh-0.6.5-1.fc22
Resolved Bugs
1213775 – CVE-2015-3146 libssh: null pointer dereference due to a logical error in the handling of a SSH_MSG_NEWKEYS and KEXDH_REPLY packets
1218076 – CVE-2015-3146 libssh: null pointer dereference due to a logical error in the handling of a SSH_MSG_NEWKEYS and KEXDH_REPLY packets [fedora-all]<br
Security fix for CVE-2015-3146
Fedora 20 Security Update: t1utils-1.39-1.fc20
Resolved Bugs
1218365 – t1utils: buffer overflow flaw
1218366 – t1utils: buffer overflow flaw [fedora-all]<br
t1utils Version 1.39 (2015-02-26)
=================================
* t1disasm: Security fixes for buffer overrun reported by Jakub Wilk and Niels Thykier.
t1utils Version 1.38 (2013-09-29)
=================================
* t1disasm: Fix an infinite loop on some fonts reported by Niels Thykier.