CESA-2016:0726 Important CentOS 6 ImageMagickSecurity Update

CentOS Errata and Security Advisory 2016:0726 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0726.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
9927fd325b74569be047a6764c1d7cf869b3d1025d23a457359e6e717aca7f7f  ImageMagick-6.7.2.7-4.el6_7.i686.rpm
8a047d350978287a19487f84f2957e234acb90c2f848ea7f501f06b622ed3490  ImageMagick-c++-6.7.2.7-4.el6_7.i686.rpm
3bbf614460cf0b3d5aba00d191c3dec52e739a4435652f4a2bd73d205a2017bf  ImageMagick-c++-devel-6.7.2.7-4.el6_7.i686.rpm
a10d5765d6dd94177fb308c647b4450b3e8ec798a3a9128e29b22f49242486d7  ImageMagick-devel-6.7.2.7-4.el6_7.i686.rpm
fb886cacd41e0148a70c76a8777f825928418a257295b235120f10c59838096b  ImageMagick-doc-6.7.2.7-4.el6_7.i686.rpm
832476e5b7b7e05727bd0985d5c9712fb7b8a4971fd74ee7b04a880e64f81891  ImageMagick-perl-6.7.2.7-4.el6_7.i686.rpm

x86_64:
9927fd325b74569be047a6764c1d7cf869b3d1025d23a457359e6e717aca7f7f  ImageMagick-6.7.2.7-4.el6_7.i686.rpm
369a736262ae06bb836fe5c5969f8f54b7617b360671daf8754328fb2a9ca232  ImageMagick-6.7.2.7-4.el6_7.x86_64.rpm
8a047d350978287a19487f84f2957e234acb90c2f848ea7f501f06b622ed3490  ImageMagick-c++-6.7.2.7-4.el6_7.i686.rpm
4acc2bc7ec94428a27d4bd8e90eb30992dcdacf442832a94900fafdee2bba161  ImageMagick-c++-6.7.2.7-4.el6_7.x86_64.rpm
3bbf614460cf0b3d5aba00d191c3dec52e739a4435652f4a2bd73d205a2017bf  ImageMagick-c++-devel-6.7.2.7-4.el6_7.i686.rpm
a03fe5caeda8b2b3fac19f667c7e8350c02254ec87348ef1a151e849ae089fee  ImageMagick-c++-devel-6.7.2.7-4.el6_7.x86_64.rpm
a10d5765d6dd94177fb308c647b4450b3e8ec798a3a9128e29b22f49242486d7  ImageMagick-devel-6.7.2.7-4.el6_7.i686.rpm
8e0fbfe3affcc5f17ecb3073fca57f983b8ea2c2743adcdad384bba29928924b  ImageMagick-devel-6.7.2.7-4.el6_7.x86_64.rpm
190d9f774cec3c009c6d3951e4994e593d923c4f016651a5330f42dc2c0a1657  ImageMagick-doc-6.7.2.7-4.el6_7.x86_64.rpm
6a965e6643de5e0c94036383af7901290fa2734308e9772eed371ca5bb160207  ImageMagick-perl-6.7.2.7-4.el6_7.x86_64.rpm

Source:
c4aebf2997a43af87c792a7face16c8f259a251394d7738193a2f4151ea542ec  ImageMagick-6.7.2.7-4.el6_7.src.rpm



CESA-2016:0724 Important CentOS 7 qemu-kvmSecurity Update

CentOS Errata and Security Advisory 2016:0724 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0724.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
846cfb9241de92a0e5b9d97817ad29c8bb9f3c9aa1353cc1ce1b30585c5ef8f1  libcacard-1.5.3-105.el7_2.4.i686.rpm
0a8b2b9f8e975d4ef114b32604570ed39eb90121d46ae4693ed1562044f5826a  libcacard-1.5.3-105.el7_2.4.x86_64.rpm
9c64d1ae730de8ea9767833b6e4a7923a87118166160a5a7dbe5fb06a87c756a  libcacard-devel-1.5.3-105.el7_2.4.i686.rpm
efa6701e687a74376e0dea22d9078e8347df8d9b494270175cc1633b6a8884aa  libcacard-devel-1.5.3-105.el7_2.4.x86_64.rpm
b55a00ab999512102c5a8b37a61662df10b5c0ba2482705f462a92b1af6089a2  libcacard-tools-1.5.3-105.el7_2.4.x86_64.rpm
03acd54102faeabfb7821fb476617f94a818c84fb59d0ea16ecdbe53ced52b8e  qemu-img-1.5.3-105.el7_2.4.x86_64.rpm
069a89fe852b1416b715c296b24b38d349b62128076497564bbcf12cb100a203  qemu-kvm-1.5.3-105.el7_2.4.x86_64.rpm
5bddf9f748929676bf2b502e0813e084e20b799474558dad24d522c4e4ef32d8  qemu-kvm-common-1.5.3-105.el7_2.4.x86_64.rpm
7e798ebafcea63fafed77f595505e4de46d93a15fe51f825c395a56728e02fb7  qemu-kvm-tools-1.5.3-105.el7_2.4.x86_64.rpm

Source:
387ca0a04bd3b4e8f81ed89b4a95e783007ce862576ba0203c2662c487e58a41  qemu-kvm-1.5.3-105.el7_2.4.src.rpm



CESA-2016:0723 Critical CentOS 7java-1.6.0-openjdk Security Update

CentOS Errata and Security Advisory 2016:0723 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0723.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
baaf85167e613fa3911ce72d225d0d4d72b28966f30032002e57770dc79a90c7  java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm
635335b8441e99ff63d2e2830b109c554bee21559e930cc2ab13c4f33c36420d  java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm
3779025d57099237b1230b303dd857fee2a58f1c166a02dea4686037b8b45a6a  java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm
91c5950396900fa3c4fcb83abdcb558ab401da7a9df428583b4b9e5811eb5d81  java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm
a197021122b770710aa518ed1cfe65db24450ba9beb05ca1519a59320081931e  java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm

Source:
e0220b0ccf31771e35847ddb92070cb972d6d4658b51ce48d76881d72ae0aa76  java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2.src.rpm



Panda Security, the tested anti-virus

antivirus panda security

Be careful! Not all anti-virus systems are what they seem and many are more hazardous than helpful for your cyber security, so was said in a recent investigation.  The investigation concluded that, today, most anti-virus’ tend to lower the threshold of Internet browser security.  Can they protect us against external threats?  How effective are they?

Traditionally, browsers incorporate tools to check certificates issued by websites to ensure that it has been issued by an appropriate entity. Panda Security’s products do not use interception techniques like intrusive man-in-the-middle through TLS proxies, to analyze our customers’ communications. Our solutions are completely transparent and do not install any type of certificate for this function. Thanks to this we can avoid these type of vulnerabilities, while minimizing the impact on the communication performance for our users’ devices. For this reason, Panda solutions are not included in the study.

Panda Antivirus, the “nonvulnerable”

Panda’s products are mentioned as those not affected by this vulnerability in Concordia University’s report.

The affected anti-virus systems in the study trick browsers, causing them to relax and trust any certificate, even though they shouldn´t. On the contrary, Panda Security solutions appears in this report because of its transparency and reliability for its users.

The post Panda Security, the tested anti-virus appeared first on Panda Security Mediacenter.

CESA-2016:0723 Critical CentOS 6java-1.6.0-openjdk Security Update

CentOS Errata and Security Advisory 2016:0723 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0723.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
0c6fe06779a1d4d859ebdb30ed512fd057a502fb78449e4955e8e2414868159a  java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.i686.rpm
0c8ac26c02b3543e4198b1da0879b7102d4f85e4ba8dc075631d056908a7c262  java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el6_7.i686.rpm
2e4b7a98603e139a0b56013225b59a73c82084648b43e5a46e89eaaa342cb276  java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el6_7.i686.rpm
dedfe6741e0c5c613de3262d2f0ed8a54ddc9e73ae655a454810a962cf8e4511  java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el6_7.i686.rpm
9d639666508200cecd87544bd5d5423bc2521e9ff5fe9144eaa3a347e08203f9  java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el6_7.i686.rpm

x86_64:
3b44a05ecc8050d3b820ea9b7dd994fe2c4a130566a8fb9899091a62ecac47ee  java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm
93b4ad4e1f2c8ea60df8d051d00e2f8d1ecbf564bd61433461ea951ae4a61ee8  java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm
c1b3018264498d8473fd72d9ef40508d6a50b028d515cd05a09b1f6b32902e03  java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm
06fb01d701b208562762f42ed91a377b647f5299b0433d0a9296491e49078959  java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm
e69695441facf02fcc2ed64c7dbc85c0b26dc202b4a63a01905b4ff4d4cd0c1a  java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el6_7.x86_64.rpm

Source:
994496b319bb30306845bcc36c3657c602a01e0dab2cb029dec8b6d6528b3d56  java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el6_7.src.rpm



CESA-2016:0723 Critical CentOS 5java-1.6.0-openjdk Security Update

CentOS Errata and Security Advisory 2016:0723 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0723.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
36e25b70ced8e7761fb2c8a54780bbe65df642bb06e29ff366e48cfe4e18ecb0  java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.i386.rpm
ca430885b7b50d5ee059e078dc87b356b4be076502a5a14a9700c7252ac369df  java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el5_11.i386.rpm
d0b6acf2e1a3e8e8fa4f304058aeff951ee5012e92c526b0443a3faa256640f1  java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el5_11.i386.rpm
c0f638d1d21ed240a1db1f3245e98c79d719a6f37be977c72fe6f8f45cec02a0  java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el5_11.i386.rpm
3abc1bf9db9f917ebfff5bcece0794e48eafa977b5ef009a94a34abe646a1e29  java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el5_11.i386.rpm

x86_64:
baad834955029d7ea3829e3ea1f5b3ecf9a2e56b71cbb8d6f972dcbadcf960ee  java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm
d717997de759ef40154352f200ca1bb593fb031217b326b738f77004b32bf47d  java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm
0cc759a6a4ca4aad7614b825ffccde9a02784ac7537ad54f7a44490cb44f5382  java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm
d8c6d345a2c73c7d055f6833244599b48d932407cb748151ac5a9b52f7a071b1  java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm
ee11396c168b9a47028eaeaba5842be9837261c2731efbf8b3d7f43c74270a1f  java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el5_11.x86_64.rpm

Source:
38436a18238d6215be1e3a204404d9e297a59250dfdd7b8150de657a233f37ec  java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el5_11.src.rpm