CESA-2016:0054 Important CentOS 5java-1.7.0-openjdk Security Update

CentOS Errata and Security Advisory 2016:0054 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0054.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
6b8356bdf8dceac8510318c20ffa6e2766319bf9343905cb922d485ed1d569b0  java-1.7.0-openjdk-1.7.0.95-2.6.4.1.el5_11.i386.rpm
6e37065079ef0ed139b94b562d43dad5a234e82798f261e8fc891e184d8bc3df  java-1.7.0-openjdk-demo-1.7.0.95-2.6.4.1.el5_11.i386.rpm
8534b7da2b47410d9a80309cb25b11b3ce4575a01362f40ac5b8c809046113c9  java-1.7.0-openjdk-devel-1.7.0.95-2.6.4.1.el5_11.i386.rpm
035c04215b55bfc1616d3e199e5a805a00a199f8cd727bc3c0e6f0c36d5e0ae4  java-1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.1.el5_11.i386.rpm
2c4e8296208edf249c7ee8535d3787bf2bbf2f05fbeee7eacec4ee05b75fd8e2  java-1.7.0-openjdk-src-1.7.0.95-2.6.4.1.el5_11.i386.rpm

x86_64:
88196e14d968cf03bac8f2d8611b6aa6bd48d20bba1f9276dbcda31bc55e258a  java-1.7.0-openjdk-1.7.0.95-2.6.4.1.el5_11.x86_64.rpm
1b7e68fb6e2646e69688706f624d59dcbf0cf712b55edbf1fbcf13940e43da77  java-1.7.0-openjdk-demo-1.7.0.95-2.6.4.1.el5_11.x86_64.rpm
87cf1b1be206b164f11c156a1335d88c9ba43e081740e85d1f58f689918fd6b5  java-1.7.0-openjdk-devel-1.7.0.95-2.6.4.1.el5_11.x86_64.rpm
02faad7501ac71eb22f02a0ebb7ba45f1987628cef576d78e40dcd3a2e177553  java-1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.1.el5_11.x86_64.rpm
1b534f1e188b78a55185064237410d0580f93b532406f4acfb6eb08f0f7d1ccf  java-1.7.0-openjdk-src-1.7.0.95-2.6.4.1.el5_11.x86_64.rpm

Source:
2f0d5f220f2855e0d5b5408959a9987bf2b682d1d094887b7d1d12e241204877  java-1.7.0-openjdk-1.7.0.95-2.6.4.1.el5_11.src.rpm



Announcing release for Gluster 3.6 and 3.7 onCentOS Linux 6 x86_64

I am happy to announce the General Availability of Gluster 3.6 and 3.7
for CentOS 6 on x86_64. These packages are following the upstream
Gluster Community releases, with one minor update for each version per
month.

Users of CentOS 6 can now simply install Gluster with only these two
commands:

  # yum install centos-release-gluster
  # yum install glusterfs-server

The centos-release-gluster content comes from the
centos-release-gluster37 package delivered via CentOS Extras repos. This
contains all the metadata and dependancy information, needed to install
Gluster 3.7.

For people looking at running Gluster 3.6, there is the
centos-release-gluster36 package. In order to get this version,
substitute the step-1 mentioned above with:

  # yum install centos-release-gluster36

We have a quickstart guide specifically built around the packages are
available now, it makes for a good introduction to Gluster and will help
get you started in just a few simple steps, this quick start is
available at
  https://wiki.centos.org/SpecialInterestGroup/Storage/gluster-Quickstart

More details about the packages that the Gluster project provides in the
Storage SIG is available in the documentation:
  https://wiki.centos.org/SpecialInterestGroup/Storage/Gluster

The centos-release-gluster* repositories offer additional packages that
enhance the usability of Gluster itself. Users can request additional
tools and applications to be provided, just send us an email with your
suggestions. The current list of packages that is (planned to become)
available can be found here:
  https://wiki.centos.org/SpecialInterestGroup/Storage/Gluster/Ecosystem-pkgs

Gluster is the first project that provides packages through the Storage
SIG. Other projects are in the process to do so too. General information
about the SIG can be read in the wiki:
  https://wiki.centos.org/SpecialInterestGroup/Storage

We welcome all feedback, comments and contributions. You can get in
touch with the CentOS Storage SIG on the centos-devel mailing list
( https://lists.centos.org ) and with the Gluster developer and user
communities at https://www.gluster.org/mailman/listinfo , we are also
available on irc at #gluster on irc.freenode.net, and on twitter at
< at >gluster .

Cheers,
Niels de Vos
Storage SIG member & Gluster maintainer

CVE-2015-8472

Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.

You Wouldn't Believe that Too Many People Still Use Terrible Passwords

Some things online can never change like — Terrible Passwords by Humans.

When it’s about various security measures to be taken in order to protect your Internet security, like installing a good anti-virus or running Linux on your system doesn’t mean that your work gets over here, and you are safe enough from online threats.

However, even after countless warnings, most people are