Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Centos » Moderate CentOS 6 openssl Security Update

Moderate CentOS 6 openssl Security Update

  • Vendor: Centos
  • Vendor ID: CESA-2015:0066
  • Date: January 20, 2015


CentOS Errata and Security Advisory 2015:0066 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0066.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
0b92c578790913dffc24ce526b0465d216dd988451a5a9666a357a321969c276 openssl-1.0.1e-30.el6_6.5.i686.rpm
20132caa37d324fd551964ea57cc7e8b92f96695636bd43ba526a304b3c03050 openssl-devel-1.0.1e-30.el6_6.5.i686.rpm
4f8ca10e73d8e34e3a40f3d9c4ffc65ac4950cda286945379e12fb6477ded3aa openssl-perl-1.0.1e-30.el6_6.5.i686.rpm
6284c6df0f702aa0af230863d08889d3ba98a33dd80a584e0d9ad017a03911e6 openssl-static-1.0.1e-30.el6_6.5.i686.rpm

x86_64:
0b92c578790913dffc24ce526b0465d216dd988451a5a9666a357a321969c276 openssl-1.0.1e-30.el6_6.5.i686.rpm
6c41a21d88d83691e9ff90fe1612a72f6f63bb8ebaaf8442c00c3cfdfd177e22 openssl-1.0.1e-30.el6_6.5.x86_64.rpm
20132caa37d324fd551964ea57cc7e8b92f96695636bd43ba526a304b3c03050 openssl-devel-1.0.1e-30.el6_6.5.i686.rpm
380236927e3a982f53571a887ae6beaa64d11e3c136bc1bdb395105b53bc5be5 openssl-devel-1.0.1e-30.el6_6.5.x86_64.rpm
d5ac362e346090eb1d21230e705b5edf926ea84dd5c9f98f4922bb7f9ec1fffa openssl-perl-1.0.1e-30.el6_6.5.x86_64.rpm
53c1ac46c19c5592ca38cb5b63841988dbe5472a0463e030fec765fbcc6d2a6a openssl-static-1.0.1e-30.el6_6.5.x86_64.rpm

Source:
61aaf1b8adff685f227ace33dec9b5ab68b4e614587d40b5dd11ba76117461ca openssl-1.0.1e-30.el6_6.5.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos at irc.freenode.net

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »