Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Centos » Moderate CentOS 6 openssl Security Update

Moderate CentOS 6 openssl Security Update

  • Vendor: Centos
  • Vendor ID: CESA-2015:0715
  • Date: March 23, 2015


CentOS Errata and Security Advisory 2015:0715 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0715.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
3fa78f468398664806f16f1b47f04eeb49c3c86b6a7c6493a1e9c4e34e5eed92 openssl-1.0.1e-30.el6_6.7.i686.rpm
f3e22401b70e87353c2370f04d1e1e6d9d68c22d22e6f37d3de46c0221d9caa8 openssl-devel-1.0.1e-30.el6_6.7.i686.rpm
d2e48d5f643899214375f04c1fc7177ea58e8aac6c72f0e087d12169d9350b98 openssl-perl-1.0.1e-30.el6_6.7.i686.rpm
54800272b5af00b33b56e02a29673e3e758a2d94487651de695a1f3218be6828 openssl-static-1.0.1e-30.el6_6.7.i686.rpm

x86_64:
3fa78f468398664806f16f1b47f04eeb49c3c86b6a7c6493a1e9c4e34e5eed92 openssl-1.0.1e-30.el6_6.7.i686.rpm
7b65b7535e4cd05b943f65dddb7d0e82400dc3c5f18e4b92ab2c643d68a4350e openssl-1.0.1e-30.el6_6.7.x86_64.rpm
f3e22401b70e87353c2370f04d1e1e6d9d68c22d22e6f37d3de46c0221d9caa8 openssl-devel-1.0.1e-30.el6_6.7.i686.rpm
4625cdf94388f9c084431c090f8144cc54b35fe8769e5bb6066561fdf5a6db40 openssl-devel-1.0.1e-30.el6_6.7.x86_64.rpm
7b1e6806b4eef12865276f923c2961673fed52d374d9402327d9eb04ad085d0b openssl-perl-1.0.1e-30.el6_6.7.x86_64.rpm
78e420e5366a8b7c96c93a07d49f49b85f6ca0ce81b4f5c599871b0b22c81d03 openssl-static-1.0.1e-30.el6_6.7.x86_64.rpm

Source:
fd5e9e6f279085a3537edfe8e464b8bae758aace31b2d6fb37ccbdcf00138c3a openssl-1.0.1e-30.el6_6.7.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos at irc.freenode.net

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »