Microsoft Releases February 2016 Security Bulletin

Original release date: February 09, 2016

Microsoft has released 13 updates to address vulnerabilities in Microsoft software. Exploitation of some of these vulnerabilities could allow a remote attacker to take control of an affected system.

Users and administrators are encouraged to review Microsoft Security Bulletins MS16-009 through MS16-022 and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.

Google Releases Security Update for Chrome

Original release date: February 09, 2016

Google has released Chrome version 48.0.2564.109 to address multiple vulnerabilities for Windows, Mac, and Linux. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.

US-CERT encourages users and administrators to review the Chrome Releases page and apply the necessary update.


This product is provided subject to this Notification and this Privacy & Use policy.

CEBA-2016:0140 CentOS 6 httpd BugFix Update

CentOS Errata and Bugfix Advisory 2016:0140 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0140.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
5f1add7f698255f1219f6048fc929925711076c79400af243b8543ed572828cf  httpd-2.2.15-47.el6.centos.2.i686.rpm
42b422488545690e24b1e35a091ac4a61f73be25babb35a8eed66fbbad22e3b0  httpd-devel-2.2.15-47.el6.centos.2.i686.rpm
eca70b9bc3314c7f1b32be6779a4f13d6c8c3aee23eb9d24d9716b4736dd599f  httpd-manual-2.2.15-47.el6.centos.2.noarch.rpm
35e16836eed1f15dc9edaa3bc831b78b3bdfbaf8c3a75cef83454db5eefa38b3  httpd-tools-2.2.15-47.el6.centos.2.i686.rpm
3acf2b5d65e7bee28ffac1c225f88695dedb083ce63d3fa1d41a77fa66e373b1  mod_ssl-2.2.15-47.el6.centos.2.i686.rpm

x86_64:
7d2ffb2a1f1c1a48c3a9c43db10542e6345fa8cc2821f9ca075d72fc6226b0c2  httpd-2.2.15-47.el6.centos.2.x86_64.rpm
42b422488545690e24b1e35a091ac4a61f73be25babb35a8eed66fbbad22e3b0  httpd-devel-2.2.15-47.el6.centos.2.i686.rpm
f279fa5f74d6fee985fd7589bc40984dba1127af4e13fd1137a7458e70d010eb  httpd-devel-2.2.15-47.el6.centos.2.x86_64.rpm
eca70b9bc3314c7f1b32be6779a4f13d6c8c3aee23eb9d24d9716b4736dd599f  httpd-manual-2.2.15-47.el6.centos.2.noarch.rpm
d9e24bf3eb5bdb4d692c8fe1707250c4efd485051a7103ec960b07b2e2f06501  httpd-tools-2.2.15-47.el6.centos.2.x86_64.rpm
c3e793ddcb4f9bb9ad89b1f4d9bd182b2dfd98b2bedad6c4ce25c8feeca6f7a1  mod_ssl-2.2.15-47.el6.centos.2.x86_64.rpm

Source:
eff61018e9d2efbd5699d64825d4ebb8fe2e492f70dde1ea08a0416a82af629d  httpd-2.2.15-47.el6.centos.2.src.rpm



CEBA-2016:0136 CentOS 6 httpd BugFix Update

CentOS Errata and Bugfix Advisory 2016:0136 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0136.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
4eaf1cbed674c7a1da99f48f306beccc18805873a1ec19ca9d3ac4033e7a7054  httpd-2.2.15-47.el6.centos.3.i686.rpm
f2870eda1af2066dccd1c885b634c165ca57fe05d839bb916c2747df0ee4c3c4  httpd-devel-2.2.15-47.el6.centos.3.i686.rpm
9c812ec8277965da7fd803631accfb765f337797ab3ffab117fa162e8db6eb61  httpd-manual-2.2.15-47.el6.centos.3.noarch.rpm
95dbc5069bbcca57a673a8df92b88a7eb65e0bfc89f495acd39b35851d74953d  httpd-tools-2.2.15-47.el6.centos.3.i686.rpm
ff256a68391af5ad882635860208972c630bf2b6b8ddefd044374da38e85383c  mod_ssl-2.2.15-47.el6.centos.3.i686.rpm

x86_64:
046d6ef58c5f35a35f14496f86462ebd7fcb1e691e846c0285159009aabb8d94  httpd-2.2.15-47.el6.centos.3.x86_64.rpm
f2870eda1af2066dccd1c885b634c165ca57fe05d839bb916c2747df0ee4c3c4  httpd-devel-2.2.15-47.el6.centos.3.i686.rpm
3e92898a5b28a0c94ff84363fb7bae7b57549b1e02f1e69bc402a6f97624a0f5  httpd-devel-2.2.15-47.el6.centos.3.x86_64.rpm
9c812ec8277965da7fd803631accfb765f337797ab3ffab117fa162e8db6eb61  httpd-manual-2.2.15-47.el6.centos.3.noarch.rpm
a9d5c20095989ee43b1c49e97233cf92b86692760e494ec038b3ebe86cf6ce1d  httpd-tools-2.2.15-47.el6.centos.3.x86_64.rpm
9be33b33188f440f2595f4d9511e40532b98bbc8ec1fd467330e9328b00ddf23  mod_ssl-2.2.15-47.el6.centos.3.x86_64.rpm

Source:
b8e08c972f702205b46622a0870523199fa41865dd69ac1802fcf6fc005323ec  httpd-2.2.15-47.el6.centos.3.src.rpm



CEBA-2016:0134 CentOS 6 firefox BugFix Update

CentOS Errata and Bugfix Advisory 2016:0134 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0134.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
732d70ca9a967fcd57ca72070966871c2962d75daf354e353ec62f277ba5e801  firefox-38.6.0-2.el6.centos.i686.rpm

x86_64:
732d70ca9a967fcd57ca72070966871c2962d75daf354e353ec62f277ba5e801  firefox-38.6.0-2.el6.centos.i686.rpm
970b53958a88395b0cdf9564fddcc953669449cfac05cb377b8208718977a78a  firefox-38.6.0-2.el6.centos.x86_64.rpm

Source:
a26f1e526805cef57139007e5fee42e8e0fa1b1aad682337a0a9c56949923598  firefox-38.6.0-2.el6.centos.src.rpm



Adobe Releases Security Updates

Original release date: February 09, 2016

Adobe has released security updates to address vulnerabilities in Connect, Experience Manager, Flash Player, and Photoshop CC and Bridge CC. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.

Users and administrators are encouraged to review Adobe Security Bulletins APSB16-07, APSB16-05, APSB16-04 APSB16-03, and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.

France Orders Facebook To Stop Tracking Non-Users or Face Fines

8th February 2016 would be considered as a cursed day in the history of Facebook. You might have known that just yesterday India bans Facebook’s Free Basic Internet in the country.

Now, Zuckerberg had got another bombshell in the form of a French Order from the European Data Protection Authority, who ordered Facebook to stop tracking non-users’ online activity and to stop data transfers of