CentOS Errata and Security Advisory 2016:0370 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0370.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 0f0313279ff6dad0387f6505d1cda9096841a183240176b72be161cd79693deb nss-util-3.19.1-9.el7_2.i686.rpm 5f0014c0514627b0532cf9d1d6eb1fcc0bdd648c9f93f8582b3b24fd292316df nss-util-3.19.1-9.el7_2.x86_64.rpm f213e755dcf945a2604d44f798ebc8625905bc75c80e57cc1acf8d0c9548169c nss-util-devel-3.19.1-9.el7_2.i686.rpm 444a889281c6fd4d06e15f401cead9199490410bfb11b9718b9945ba1f1c55fc nss-util-devel-3.19.1-9.el7_2.x86_64.rpm Source: 9d23e31396ba2ab09ce6033abfddddfd7821adbd04d8130c24893c30c605dd49 nss-util-3.19.1-9.el7_2.src.rpm
Monthly Archives: March 2016
CESA-2016:0372 Important CentOS 7 openssl098eSecurity Update
CentOS Errata and Security Advisory 2016:0372 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0372.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: bda50ad8086ae3f1265eab271d0523c86cde3e9d1ef1fccbd4cce1abf13636e8 openssl098e-0.9.8e-29.el7.centos.3.i686.rpm 65f73db4d80916a1315f5d6b79cc6dcfbed20ccf84a3a7ab05600b287ab25fcf openssl098e-0.9.8e-29.el7.centos.3.x86_64.rpm Source: c26eecaec1161dca9a32db13cd26c70f811bdb3050b30e02b4ea483d31c67d44 openssl098e-0.9.8e-29.el7.centos.3.src.rpm
CESA-2016:0371 Critical CentOS 5 nss SecurityUpdate
CentOS Errata and Security Advisory 2016:0371 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0371.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: d162fe532225c87dc2ce7ff1f3e6fc0026e6a58ed46fd908a658a8c7afda166f nss-3.19.1-4.el5_11.i386.rpm 45520755d87a52d3c8161640d6c4f018a0a5a80d873b51aaf461446604f5081f nss-devel-3.19.1-4.el5_11.i386.rpm a2a687f0bf9d3d630c22a596f1756d06bdf66fb459876be2707d73fe9949966a nss-pkcs11-devel-3.19.1-4.el5_11.i386.rpm 329ed95e37bf149c511f8452d862733bc9f5b49270eb948efe01ea2b808e3408 nss-tools-3.19.1-4.el5_11.i386.rpm x86_64: d162fe532225c87dc2ce7ff1f3e6fc0026e6a58ed46fd908a658a8c7afda166f nss-3.19.1-4.el5_11.i386.rpm 8cfa4bfb39f506be043c369163c85566264eb91646c99f78cc6e9a94a0c2898d nss-3.19.1-4.el5_11.x86_64.rpm 45520755d87a52d3c8161640d6c4f018a0a5a80d873b51aaf461446604f5081f nss-devel-3.19.1-4.el5_11.i386.rpm cfccce180e30ca0caca948726f5b3924a623af13eac15d721d884cd7ea904421 nss-devel-3.19.1-4.el5_11.x86_64.rpm a2a687f0bf9d3d630c22a596f1756d06bdf66fb459876be2707d73fe9949966a nss-pkcs11-devel-3.19.1-4.el5_11.i386.rpm 9607fa0d624d4bcfd1f5704dac66cd98ddd0953fce82ecde9545892cb8af30b2 nss-pkcs11-devel-3.19.1-4.el5_11.x86_64.rpm 0bee51b745b3ec978a25681f617645c06bb906e7e5af848f1cc2db92f652d007 nss-tools-3.19.1-4.el5_11.x86_64.rpm Source: 08c533786c410cc3c32bf2c72430b281073fe91b002197fe5f9b1ec9f8d0a257 nss-3.19.1-4.el5_11.src.rpm
CESA-2016:0372 Important CentOS 6 openssl098eSecurity Update
CentOS Errata and Security Advisory 2016:0372 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0372.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: e87cdaa0c6d6528e4395026ed75dd8c06d1d9cd20cbfc2b88b0d6046482aaa82 openssl098e-0.9.8e-20.el6.centos.1.i686.rpm x86_64: e87cdaa0c6d6528e4395026ed75dd8c06d1d9cd20cbfc2b88b0d6046482aaa82 openssl098e-0.9.8e-20.el6.centos.1.i686.rpm 5c8881e272b9b1415d175bc1f4eecce80ea15b4090aac9725dfe67c19db53f70 openssl098e-0.9.8e-20.el6.centos.1.x86_64.rpm Source: 7fea74c0623b0c425d9ff03e2412731c99a75e86eaa87d67a66b9903bb4aca2b openssl098e-0.9.8e-20.el6.centos.1.src.rpm
CESA-2016:0370 Critical CentOS 6 nss-utilSecurity Update
CentOS Errata and Security Advisory 2016:0370 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0370.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 70808df51eaef656a3ec37de84e8b1d72f88a2e1eefd2872f7daec139c90002a nss-util-3.19.1-5.el6_7.i686.rpm 9692ccf29dd88533a76cd64f8bfb894c2de09d3cc9752652c9d8700fb1fdfd79 nss-util-devel-3.19.1-5.el6_7.i686.rpm x86_64: 70808df51eaef656a3ec37de84e8b1d72f88a2e1eefd2872f7daec139c90002a nss-util-3.19.1-5.el6_7.i686.rpm 0647d08428e5ed60e2b35b2d113b90bcec3c617c61c2a7cd537e8136da27cb37 nss-util-3.19.1-5.el6_7.x86_64.rpm 9692ccf29dd88533a76cd64f8bfb894c2de09d3cc9752652c9d8700fb1fdfd79 nss-util-devel-3.19.1-5.el6_7.i686.rpm d068849494bed51503a5e487f3d08bb4afef71ffc0b7c80ccb16dfe91f36fd4b nss-util-devel-3.19.1-5.el6_7.x86_64.rpm Source: cf86d7158cd5e3fa1af15b40458728bf7507cb44089b0428492d5ac11cafa423 nss-util-3.19.1-5.el6_7.src.rpm
More than 1 Million Websites Install Free SSL Certificate (and Counting…)
Let’s Encrypt has achieved another big milestone by issuing 1 million free Transport Layer Security (TLS) SSL Certificates to webmasters who wish to secure the communications between their users and domains.
Let’s Encrypt – operated by the Internet Security Research Group (ISRG) – is an absolutely free, and open source certificate authority recognized by all major browsers, including
![]()
Google Releases Security Update for Chrome
Original release date: March 08, 2016
Google has released Chrome version 49.0.2623.87 to address multiple vulnerabilities for Windows, Mac, and Linux. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
US-CERT encourages users and administrators to review the Chrome Releases page and apply the necessary update.
This product is provided subject to this Notification and this Privacy & Use policy.
GLSA 201603-05: LibreOffice, OpenOffice: Multiple vulnerabilities
GLSA 201603-04: FUSE: incorrect filtering of environment variables leading to privilege escalation
DSA-3510 iceweasel – security update
Multiple security issues have been found in Iceweasel, Debian’s version
of the Mozilla Firefox web browser: Multiple memory safety errors,
buffer overflows, use-after-frees and other implementation errors may
lead to the execution of arbitrary code, denial of service, address bar
spoofing and overwriting local files.
