Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Centos » Important CentOS 6 jasper Security Update

Important CentOS 6 jasper Security Update

  • Vendor: Centos
  • Vendor ID: CESA-2014:2021
  • Date: December 18, 2014


CentOS Errata and Security Advisory 2014:2021 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2014-2021.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
04d4070c104df7ffbad82cea6877551a3ccb5833d1be8bb891970af50c75edea jasper-1.900.1-16.el6_6.2.i686.rpm
1730bd745df6e5a3f32d8c1ef62edda9e7e3e17e24a10467315f88ad0a9efcd6 jasper-devel-1.900.1-16.el6_6.2.i686.rpm
cb599c957af40969fdf7f8f2d9c17976f56232bf9816c9ee9d3082ae1cc46485 jasper-libs-1.900.1-16.el6_6.2.i686.rpm
f35db6119ba75befb7464b133537073c785949de047af5f83e828190517f40bb jasper-utils-1.900.1-16.el6_6.2.i686.rpm

x86_64:
043f1b7a8a5ade68b0416a91885d1f76bc5183cefdb99d2d6d02d5724c8e1af5 jasper-1.900.1-16.el6_6.2.x86_64.rpm
1730bd745df6e5a3f32d8c1ef62edda9e7e3e17e24a10467315f88ad0a9efcd6 jasper-devel-1.900.1-16.el6_6.2.i686.rpm
5fee6133a02e834451bb617a66602a35efde6c51d40c940fefe82187af9df2c3 jasper-devel-1.900.1-16.el6_6.2.x86_64.rpm
cb599c957af40969fdf7f8f2d9c17976f56232bf9816c9ee9d3082ae1cc46485 jasper-libs-1.900.1-16.el6_6.2.i686.rpm
6dcf0a563ff5ec86e07e710bed4f97ccda0f0c65ede7598688beb9bfec496132 jasper-libs-1.900.1-16.el6_6.2.x86_64.rpm
bdaa8b107f8587e588b983763d28fbcf6b3394fb9d5242f23a1eb7e8e7ae4f46 jasper-utils-1.900.1-16.el6_6.2.x86_64.rpm

Source:
baf835a26ca612f33cfb42983ff03adb455bd99201544fc0fb8001452294eb64 jasper-1.900.1-16.el6_6.2.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos at irc.freenode.net

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »