CentOS Errata and Enhancement Advisory 2016:0683 Upstream details at : https://rhn.redhat.com/errata/RHEA-2016-0683.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 57d7e4c3f03b35ab0b95808de779bede15909718a3a3c09637ec82e9eb9ad53d tzdata-2016d-1.el7.noarch.rpm 43bf52c3c30e55eb107bbde5235c12d9afd1009ae6f12c5310c76fd4145a00da tzdata-java-2016d-1.el7.noarch.rpm Source: daa340cc9b6340c361d5feb3b1dc93e7ef0c19719738aa29d4d4a6e3b74bf528 tzdata-2016d-1.el7.src.rpm
Monthly Archives: April 2016
Experts Weigh-In Over FBI $1.3 Million iPhone Zero-Day Payout
Was the Federal Bureau of Investigation justified in paying over $1.3 million for a hacking tool that opened the iPhone 5c of San Bernardino terrorist?
CEEA-2016:0683 CentOS 6 tzdata Enhancement Update
CentOS Errata and Enhancement Advisory 2016:0683 Upstream details at : https://rhn.redhat.com/errata/RHEA-2016-0683.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 648b5c1c0dc0890ee3194aad413b0d952e28cc0325247548f24092d2cfef222a tzdata-2016d-1.el6.noarch.rpm a3aa69f440c5d5ff03192f8b14bd80903232c52bf61533d5d54423fac7b382be tzdata-java-2016d-1.el6.noarch.rpm x86_64: 648b5c1c0dc0890ee3194aad413b0d952e28cc0325247548f24092d2cfef222a tzdata-2016d-1.el6.noarch.rpm a3aa69f440c5d5ff03192f8b14bd80903232c52bf61533d5d54423fac7b382be tzdata-java-2016d-1.el6.noarch.rpm Source: 69641ac33c2b4de7bf4ad934fd885e90d13efbf377f0a12e2b9001666c67dd82 tzdata-2016d-1.el6.src.rpm
CEEA-2016:0683 CentOS 5 tzdata Enhancement Update
CentOS Errata and Enhancement Advisory 2016:0683 Upstream details at : https://rhn.redhat.com/errata/RHEA-2016-0683.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 54d05bf911d8ee5756581ca4a6f680a17331a8ad81a78a4c2fab444eef4ae4a4 tzdata-2016d-1.el5.i386.rpm 3ba460b1fc6d3e5087a34f29d94b02d80b0cfb96291e4325d5dade203120279c tzdata-java-2016d-1.el5.i386.rpm x86_64: a3f76a48da798cf6074da566312ef38d3453f1bc4f47e57650bd4d8287ac2147 tzdata-2016d-1.el5.x86_64.rpm b85b0e326c82dc3ed6cc03ea4d555662977fd3ff169a31f3c6113320a9b445dd tzdata-java-2016d-1.el5.x86_64.rpm Source: f50acf35e30f529551db9e8d38ffa214a3b5f518e52195e5ffc96d04ec8fb796 tzdata-2016d-1.el5.src.rpm
More than 1 million People now access Facebook Over Tor Network
In Brief
Facebook has hit another Milestone: More than 1 MILLION people, or you can say privacy conscious, are accessing Facebook over TOR.
Facebook proudly announced today that, this month, for the first time, the people connected to the anonymous version of Facebook that’s accessible only through the TOR anonymity network exceeded 1 Million – an increase of almost 100% in the past ten
![]()
CEEA-2016:0682 CentOS 6 qla2xxx Enhancement Update
CentOS Errata and Enhancement Advisory 2016:0682 Upstream details at : https://rhn.redhat.com/errata/RHEA-2016-0682.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: beb8bae27284f3d614fc06a783956a67bdf4954962014a9e79e6dca337a4d65f kmod-qla2xxx-8.07.00.26.06.8_k-1.el6_7.i686.rpm x86_64: 913727d84d304f885ac611a8205e8e4783400d0769146cb63794bf9148645e10 kmod-qla2xxx-8.07.00.26.06.8_k-1.el6_7.x86_64.rpm Source: 5bf20afc610114f1aacc3163db44e1c9789775f29edc191e30055ba505028fc6 qla2xxx-8.07.00.26.06.8_k-1.el6_7.src.rpm
CVE-2016-4059
Use-after-free vulnerability in Foxit Reader and PhantomPDF before 7.3.4 on Windows allows remote attackers to execute arbitrary code via a crafted FlateDecode stream in a PDF document.
CVE-2016-4060
Use-after-free vulnerability in Foxit Reader and PhantomPDF before 7.3.4 on Windows allows remote attackers to cause a denial of service (application crash) via unspecified vectors.
CVE-2016-4061
Foxit Reader and PhantomPDF before 7.3.4 on Windows allow remote attackers to cause a denial of service (application crash) via a crafted content stream.
CVE-2016-4062
Foxit Reader and PhantomPDF before 7.3.4 on Windows improperly report format errors recursively, which allows remote attackers to cause a denial of service (application hang) via a crafted PDF.
