CentOS Errata and Bugfix Advisory 2016:0468 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0468.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: c2af38939e36c4c8254fbc4ccbcb91d95298b915243d5a49d627bdcc28106f3d 389-ds-base-1.2.11.15-72.el6_7.i686.rpm 8f15a75d1dcdb72a2bd1be0b8b6994ba16d9e1fddfce64668d316a4786915e0f 389-ds-base-devel-1.2.11.15-72.el6_7.i686.rpm 6f13d9f79b7ee66347e03a5aeea013529f15870c4de65e9a498b8fd0fd3d0b6b 389-ds-base-libs-1.2.11.15-72.el6_7.i686.rpm x86_64: b6f1a3b6a701ecb8cecaf8965fa7e7f9a01434117bcfd2f9096757e4e6da63e5 389-ds-base-1.2.11.15-72.el6_7.x86_64.rpm 8f15a75d1dcdb72a2bd1be0b8b6994ba16d9e1fddfce64668d316a4786915e0f 389-ds-base-devel-1.2.11.15-72.el6_7.i686.rpm 770da14786812860ef59147c9b6034fdc40610d8c6a94e267d0f27522c8def95 389-ds-base-devel-1.2.11.15-72.el6_7.x86_64.rpm 6f13d9f79b7ee66347e03a5aeea013529f15870c4de65e9a498b8fd0fd3d0b6b 389-ds-base-libs-1.2.11.15-72.el6_7.i686.rpm c96371ce99f1100fe3b1bb0e303d955f4a849903193fed965a166787966e1c86 389-ds-base-libs-1.2.11.15-72.el6_7.x86_64.rpm Source: 474ca9cc028d36a64bc4184c6f5cd34e73ba33878607d8c5fa4b4b9722e7f504 389-ds-base-1.2.11.15-72.el6_7.src.rpm
Monthly Archives: March 2016
CEBA-2016:0476 CentOS 6 glusterfs BugFix Update
CentOS Errata and Bugfix Advisory 2016:0476 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0476.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 76ec585c04a25aa628f467f3b1641a7a749b4cf1dcd7ee5ea8823bb46cbf76a5 glusterfs-3.6.0.55-1.el6.x86_64.rpm 2d2f63711bd2831363caa89835987daadf0bf240e2a4689fd5c660f8f99a58e1 glusterfs-api-3.6.0.55-1.el6.x86_64.rpm 05833c767ef2d3e5a46cdd8d47c7f17d20e58739e893df1ba0ddf14bf7e29380 glusterfs-api-devel-3.6.0.55-1.el6.x86_64.rpm 0d1600093d107c3e03efaba6895117bd237cc7db9f2f0310b2915c9e46ba1ff4 glusterfs-cli-3.6.0.55-1.el6.x86_64.rpm 839f980ebb4c0049a7a7b9c8e8f8d0845b5b01144a10b1c230a01761b6130e5d glusterfs-devel-3.6.0.55-1.el6.x86_64.rpm b222262f1b97e4c891b1c17ebb047c4817b70fa58670a8196ee5b4cb4b21ee3e glusterfs-fuse-3.6.0.55-1.el6.x86_64.rpm b3990dfb1247bcde3ac6e945ee11d8c3de6986e17b057fe801fbfad354390b68 glusterfs-libs-3.6.0.55-1.el6.x86_64.rpm d5d2f9e0ad327e100588f7b3735c03dbd72f233772e17ae390e00361334add31 glusterfs-rdma-3.6.0.55-1.el6.x86_64.rpm Source: 4eb216f9c3d46b1a1389091627f4c2d934570680a936a6046e6e87766e684b97 glusterfs-3.6.0.55-1.el6.src.rpm
CEBA-2016:0469 CentOS 6 haproxy BugFix Update
CentOS Errata and Bugfix Advisory 2016:0469 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-0469.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: c45e323d582b1e22dd553c8efb97f6dd5265cda4f6e6c8f41c8736e9cf2bdc5f haproxy-1.5.4-2.el6_7.2.i686.rpm x86_64: 7e51d9a8f4f23857c7c533f707cec3efa8af725f7221abfc58ef8d227592d1c5 haproxy-1.5.4-2.el6_7.2.x86_64.rpm Source: 162b5ded55dd1ed43a10baaa5c1b2d5ed5b0fa2da88f673b4143a5eedee8ba48 haproxy-1.5.4-2.el6_7.2.src.rpm
FBI may have found a New Way to Unlock Shooter's iPhone without Apple
There’s more coming to the high-profile Apple vs. FBI case.
The Federal Bureau of Investigation (FBI) might not need Apple’s assistance to unlock iPhone 5C that belonged to San Bernardino shooter, Syed Rizwan Farook.
If you have followed the San Bernardino case closely, you probably know everything about the ongoing encryption battle between the FBI and Apple.
In short, the US
![]()
APPLE-SA-2016-03-21-1 iOS 9.3
From: Apple Product Security
Reply to list
APPLE-SA-2016-03-21-1 iOS 9.3 iOS 9.3 is now available and addresses the following: AppleUSBNetworking Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An application may be able to execute arbitrary code with kernel privileges [...]
APPLE-SA-2016-03-21-2 watchOS 2.2
From: Apple Product Security
Reply to list
APPLE-SA-2016-03-21-2 watchOS 2.2 watchOS 2.2 is now available and addresses the following: Disk Images Available for: Apple Watch Sport, Apple Watch, Apple Watch Edition, and Apple Watch Hermes Impact: An application may be able to execute arbitrary code with kernel privileges [...]
APPLE-SA-2016-03-21-3 tvOS 9.2
From: Apple Product Security
Reply to list
APPLE-SA-2016-03-21-3 tvOS 9.2 tvOS 9.2 is now available and addresses the following: FontParser Available for: Apple TV (4th generation) Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution [...]
APPLE-SA-2016-03-21-4 Xcode 7.3
From: Apple Product Security
Reply to list
APPLE-SA-2016-03-21-4 Xcode 7.3 Xcode 7.3 is now available and addresses the following: otool Available for: OS X El Capitan v10.11 and later Impact: A local attacker may be able to cause unexpected application termination or arbitrary code execution [...]
APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002
From: Apple Product Security
Reply to list
APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002 OS X El Capitan 10.11.4 and Security Update 2016-002 is now available and addresses the following: apache_mod_php Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11. [...]
APPLE-SA-2016-03-21-6 Safari 9.1
From: Apple Product Security
Reply to list
APPLE-SA-2016-03-21-6 Safari 9.1 Safari 9.1 is now available and addresses the following: libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Processing maliciously crafted XML may lead to unexpected [...]
