More than a Billion Snapdragon-based Android Phones Vulnerable to Hacking

More than a Billion of Android devices are at risk of a severe vulnerability in Qualcomm Snapdragon chip that could be exploited by any malicious application to gain root access on the device.

Security experts at Trend Micro are warning Android users of some severe programming blunders in Qualcomm’s kernel-level Snapdragon code that if exploited, can be used by attackers for gaining root

Fast Autocomplete – Critical – DOS vulnerability – SA-CONTRIB-2016-016

Description

This module enables you to show IMDB-like suggestions when entering terms into an input field using json files to “cache” suggestions making the autocomplete very fast.

The module doesn’t sufficiently validate the incoming language parameter in the request path when a json file of the module is requested resulting in folders being created in the public files directory where the module stores its json files. This vulnerability can be exploited to perform a DOS-attack by depletion of available inodes on the webserver.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.

Versions affected

  • Fast Autocomplete 7.x-1.x versions prior to 7.x-1.1.

Drupal core is not affected. If you do not use the contributed Fast Autocomplete module, there is nothing you need to do.

Solution

Install the latest version:

While version 7.x-1.1 is not vulnerable, it contains a major bug affecting functionality. Also see the Fast Autocomplete project page.

Reported by

Fixed by

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal version: 

CESA-2016:0459 Important CentOS 7 bind SecurityUpdate

CentOS Errata and Security Advisory 2016:0459 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0459.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
137b51b4db465e884e85a02862bb4324cb2c09e36645833526af773f66400111  bind-9.9.4-29.el7_2.3.x86_64.rpm
ad11b0805dc4914a6a1f941bbe7e7df05ca38ac8be38b352b4eb0bcfb1fa97ee  bind-chroot-9.9.4-29.el7_2.3.x86_64.rpm
f3ab05dd382137f5d2734f8a8da29ea548487ad7a2b785c1c132522ae5f93de1  bind-devel-9.9.4-29.el7_2.3.i686.rpm
78face375361ca7d3329e5e54b518b052e92c8952f2212eed89abd161b875286  bind-devel-9.9.4-29.el7_2.3.x86_64.rpm
0c4961ac609e396387eec4168854ff1b32935f4155419b5c7d724951df348d9f  bind-libs-9.9.4-29.el7_2.3.i686.rpm
babf3ef8173c0a14f80274a882f76f70bef8864ee7409fc5d267b2a02e135e2f  bind-libs-9.9.4-29.el7_2.3.x86_64.rpm
de3477a4ccc3c55f89b7b9cb3c493ffd9edfde9a57329f7a9f07439d012e45fe  bind-libs-lite-9.9.4-29.el7_2.3.i686.rpm
0df8e93382797ca9e1be51309f0cd8fc4eb0c5f46f415927275a24b8fe1a834b  bind-libs-lite-9.9.4-29.el7_2.3.x86_64.rpm
f6601959c359db93b8a6a69759c22bb08797a392760ec27b8296d2bb739dba9f  bind-license-9.9.4-29.el7_2.3.noarch.rpm
131a34fcc6265a0e5a31afeec0bdb8e589c3fdc1a965a1746d61234ffbea232e  bind-lite-devel-9.9.4-29.el7_2.3.i686.rpm
fcdb776b789de02025e3484657327b4800a92e8707264d93a61bb57e4a1ad6d2  bind-lite-devel-9.9.4-29.el7_2.3.x86_64.rpm
d249990bdae9e1ca118b9e5f2cfa44b18fc8e70446cbf9f0c94ea827c36fd64e  bind-pkcs11-9.9.4-29.el7_2.3.x86_64.rpm
7faa189d77dae6452816d7730ce80a4670011f1cab65890bdea5fd728162d8d4  bind-pkcs11-devel-9.9.4-29.el7_2.3.i686.rpm
1a384cf1fb2d08d5afc1a83243dc1f692d3036f37923df5511d312dab61d7d58  bind-pkcs11-devel-9.9.4-29.el7_2.3.x86_64.rpm
cb8b648e67093a13ff8f5136123075d00ba84f1cb15dcdb54f29d92b423c344b  bind-pkcs11-libs-9.9.4-29.el7_2.3.i686.rpm
58e866f4d01d36e90a80a70d75ef66d782a529276b134741d6619c6e217db2b9  bind-pkcs11-libs-9.9.4-29.el7_2.3.x86_64.rpm
cc37699c9587edb1eed3f908abfb2cfbf3217c6885f5e86ed2361dbe278afabd  bind-pkcs11-utils-9.9.4-29.el7_2.3.x86_64.rpm
3f578514afca458d225f8ae3c19b8a0c3c7658f94919eb45dd5835f5006652b4  bind-sdb-9.9.4-29.el7_2.3.x86_64.rpm
24591c4bad24906f632dabe0de509a6b87a8ffe5ae16d31072013655abe66b0e  bind-sdb-chroot-9.9.4-29.el7_2.3.x86_64.rpm
9feb2f7fb778730f694343c030856a3585dfbe3d4bca300f6b4cd1ab53eefc1c  bind-utils-9.9.4-29.el7_2.3.x86_64.rpm

Source:
eaff3e7cf4061acb9a123eb83c72b538ae94f6efd18dfa73beb77d8a81864179  bind-9.9.4-29.el7_2.3.src.rpm



Russia Rejects Google's Appeal and Orders to Stop Pre-Installing its own Android Apps

The Giant search engine Google has lost an anti-monopoly appeal in Russia against ruling related to its Android mobile OS

The Moscow Arbitration Court on Monday ruled that Google had violated its dominant position with the help of its free open source mobile platform “Android” by forcing its own apps and services like Youtube, Google Map, and others, on users — reducing competition.

The