Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Centos » Important CentOS 6 jasper Security Update

Important CentOS 6 jasper Security Update

  • Vendor: Centos
  • Vendor ID: CESA-2015:0074
  • Date: January 22, 2015


CentOS Errata and Security Advisory 2015:0074 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0074.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
02f67d2e5b95c3deac8b8fe531bd0ed1a64b84565c54f6a6a8751bbbca7b6d8f jasper-1.900.1-16.el6_6.3.i686.rpm
16d4410c882cc8170de29dfe23eb2e157e3c28dbe5171c91adf797d33ea2ffe8 jasper-devel-1.900.1-16.el6_6.3.i686.rpm
867485f066f16b8d4067771a01f6f8c60dda135f27c5a6441b2089d8e9255533 jasper-libs-1.900.1-16.el6_6.3.i686.rpm
a66de49b3222920f133dffba8a0e29ed3088cbb9789e213dff39fa49fc24ee26 jasper-utils-1.900.1-16.el6_6.3.i686.rpm

x86_64:
1c5deb1cb8023125cf8e4e9b925b587b8192add3b2a1067e31cb057b961e795e jasper-1.900.1-16.el6_6.3.x86_64.rpm
16d4410c882cc8170de29dfe23eb2e157e3c28dbe5171c91adf797d33ea2ffe8 jasper-devel-1.900.1-16.el6_6.3.i686.rpm
03b77c531aa6a9d8faaa3582903a9f8c0925efd1e08acc955e12d95566754bf6 jasper-devel-1.900.1-16.el6_6.3.x86_64.rpm
867485f066f16b8d4067771a01f6f8c60dda135f27c5a6441b2089d8e9255533 jasper-libs-1.900.1-16.el6_6.3.i686.rpm
f97f6af75d7ac6140e4f126e4e34b8e5b2eba7a0c6ed65694cecaaf88100d806 jasper-libs-1.900.1-16.el6_6.3.x86_64.rpm
206e28a1040407e452f65cfcc02db518c5737455c620c2e5ef87703ddfa4559d jasper-utils-1.900.1-16.el6_6.3.x86_64.rpm

Source:
28ef9fb9cc889fc9f43cd360125de42994829a92c5ede0b3d82dc9e0159f4605 jasper-1.900.1-16.el6_6.3.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos at irc.freenode.net

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »