Updated openssl098e packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 6 and 7.Red Hat Product Security has rated this update as having Important securityimpact.

Common Vulnerability Scoring System (CVSS) base scores, which givedetailed severity ratings, are available for each vulnerability from theCVE links in the References section.
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)and Transport Layer Security (TLS v1) protocols, as well as afull-strength, general purpose cryptography library.A padding oracle flaw was found in the Secure Sockets Layer version 2.0(SSLv2) protocol.

An attacker can potentially use this flaw to decryptRSA-encrypted cipher text from a connection using a newer SSL/TLS protocolversion, allowing them to decrypt such connections.

This cross-protocolattack is publicly referred to as DROWN. (CVE-2016-0800)Note: This issue was addressed by disabling the SSLv2 protocol by defaultwhen using the ‘SSLv23’ connection methods, and removing support for weakSSLv2 cipher suites.

For more information, refer to the knowledge basearticle linked to in the References section.It was discovered that the SSLv2 servers using OpenSSL accepted SSLv2connection handshakes that indicated non-zero clear key length fornon-export cipher suites.

An attacker could use this flaw to decryptrecorded SSLv2 sessions with the server by using it as a decryptionoracle.(CVE-2016-0703)It was discovered that the SSLv2 protocol implementation in OpenSSL didnot properly implement the Bleichenbacher protection for export ciphersuites.

An attacker could use a SSLv2 server using OpenSSL as aBleichenbacher oracle. (CVE-2016-0704)Note: The CVE-2016-0703 and CVE-2016-0704 issues could allow for moreefficient exploitation of the CVE-2016-0800 issue via the DROWN attack.A denial of service flaw was found in the way OpenSSL handled SSLv2handshake messages.

A remote attacker could use this flaw to cause aTLS/SSL server using OpenSSL to exit on a failed assertion if it had boththe SSLv2 protocol and EXPORT-grade cipher suites enabled. (CVE-2015-0293)A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2ciphers that have been disabled on the server.

This could result in weakSSLv2 ciphers being used for SSLv2 connections, making them vulnerable toman-in-the-middle attacks. (CVE-2015-3197)Red Hat would like to thank the OpenSSL project for reporting these issues.Upstream acknowledges Nimrod Aviram and Sebastian Schinzel as the originalreporters of CVE-2016-0800 and CVE-2015-3197; David Adrian (University ofMichigan) and J.

Alex Halderman (University of Michigan) as the originalreporters of CVE-2016-0703 and CVE-2016-0704; and Sean Burford (Google) andEmilia Käsper (OpenSSL development team) as the original reporters ofCVE-2015-0293.All openssl098e users are advised to upgrade to these updated packages,which contain backported patches to correct these issues.

For the updateto take effect, all services linked to the openssl098e library must berestarted, or the system rebooted.
Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
openssl098e-0.9.8e-20.el6_7.1.src.rpm
    MD5: 3599347328567ef169e87f2f642652a5SHA-256: 5caa21e1875e0fabdfaccd8e728ce542331a641464328ad74527c9e3f7fbfce3
 
IA-32:
openssl098e-0.9.8e-20.el6_7.1.i686.rpm
    MD5: 7abeb2fae0ff24f9964bac0f0571186bSHA-256: ffb88e988415fd6ab98bb9c9c7d5f285a6f56f8ed93bced16fff660befc6d101
openssl098e-debuginfo-0.9.8e-20.el6_7.1.i686.rpm
    MD5: b045a964fae8756498181a9cbed97c34SHA-256: 2862847ecc488a23bc5bfc39f725a213ccf6720a5aa1be9948be77b1bf082c67
 
x86_64:
openssl098e-0.9.8e-20.el6_7.1.i686.rpm
    MD5: 7abeb2fae0ff24f9964bac0f0571186bSHA-256: ffb88e988415fd6ab98bb9c9c7d5f285a6f56f8ed93bced16fff660befc6d101
openssl098e-0.9.8e-20.el6_7.1.x86_64.rpm
    MD5: bc93d8faa5728cc9d6d547e03b3ceefbSHA-256: 3ca150298dfc9a4a4c0f56d08e7f3699164cc07a0d78b484607c794398cab689
openssl098e-debuginfo-0.9.8e-20.el6_7.1.i686.rpm
    MD5: b045a964fae8756498181a9cbed97c34SHA-256: 2862847ecc488a23bc5bfc39f725a213ccf6720a5aa1be9948be77b1bf082c67
openssl098e-debuginfo-0.9.8e-20.el6_7.1.x86_64.rpm
    MD5: 1a8248fad52e2ca04e23f16d251d913bSHA-256: 88ecb7ee3f9e0e625761d85f580d03ee2c9bc3a7f060d0586b734719c4e95990
 
Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
openssl098e-0.9.8e-29.el7_2.3.src.rpm
    MD5: 2721d6830e0cd8db2d8e8732a8dc818cSHA-256: f78ccf8fb133b85f51094434fa581d46373af888f7283678222967af12c3b600
 
x86_64:
openssl098e-0.9.8e-29.el7_2.3.i686.rpm
    MD5: ddb190a2a03f7e6eb4cf3aaf2500819eSHA-256: a35fc00f41fc25a3dca1aab049794a30d646fabd6dd3a488dfb34cbb293eb053
openssl098e-0.9.8e-29.el7_2.3.x86_64.rpm
    MD5: 2138994040af4f8dbabd6ee318b2d9cdSHA-256: 63c43f42d781b3932a33e5de5eb1084e546712c0b38c6f1ad0df2e69fc3df9fb
openssl098e-debuginfo-0.9.8e-29.el7_2.3.i686.rpm
    MD5: 03cd4f520865f9b3059481aedab4d5a9SHA-256: cedbdff1be37d3dc07aa47f8a42fb4467b8eb95d092b894dc2fd09452a560320
openssl098e-debuginfo-0.9.8e-29.el7_2.3.x86_64.rpm
    MD5: 3ace733250014c6c42181ef6b086fd93SHA-256: 5cafbcc03264c6274a0855be353b5e34ea980692e1fd43c9af27985c5bd3ec20
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
openssl098e-0.9.8e-20.el6_7.1.src.rpm
    MD5: 3599347328567ef169e87f2f642652a5SHA-256: 5caa21e1875e0fabdfaccd8e728ce542331a641464328ad74527c9e3f7fbfce3
 
x86_64:
openssl098e-0.9.8e-20.el6_7.1.i686.rpm
    MD5: 7abeb2fae0ff24f9964bac0f0571186bSHA-256: ffb88e988415fd6ab98bb9c9c7d5f285a6f56f8ed93bced16fff660befc6d101
openssl098e-0.9.8e-20.el6_7.1.x86_64.rpm
    MD5: bc93d8faa5728cc9d6d547e03b3ceefbSHA-256: 3ca150298dfc9a4a4c0f56d08e7f3699164cc07a0d78b484607c794398cab689
openssl098e-debuginfo-0.9.8e-20.el6_7.1.i686.rpm
    MD5: b045a964fae8756498181a9cbed97c34SHA-256: 2862847ecc488a23bc5bfc39f725a213ccf6720a5aa1be9948be77b1bf082c67
openssl098e-debuginfo-0.9.8e-20.el6_7.1.x86_64.rpm
    MD5: 1a8248fad52e2ca04e23f16d251d913bSHA-256: 88ecb7ee3f9e0e625761d85f580d03ee2c9bc3a7f060d0586b734719c4e95990
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
openssl098e-0.9.8e-29.el7_2.3.src.rpm
    MD5: 2721d6830e0cd8db2d8e8732a8dc818cSHA-256: f78ccf8fb133b85f51094434fa581d46373af888f7283678222967af12c3b600
 
x86_64:
openssl098e-0.9.8e-29.el7_2.3.i686.rpm
    MD5: ddb190a2a03f7e6eb4cf3aaf2500819eSHA-256: a35fc00f41fc25a3dca1aab049794a30d646fabd6dd3a488dfb34cbb293eb053
openssl098e-0.9.8e-29.el7_2.3.x86_64.rpm
    MD5: 2138994040af4f8dbabd6ee318b2d9cdSHA-256: 63c43f42d781b3932a33e5de5eb1084e546712c0b38c6f1ad0df2e69fc3df9fb
openssl098e-debuginfo-0.9.8e-29.el7_2.3.i686.rpm
    MD5: 03cd4f520865f9b3059481aedab4d5a9SHA-256: cedbdff1be37d3dc07aa47f8a42fb4467b8eb95d092b894dc2fd09452a560320
openssl098e-debuginfo-0.9.8e-29.el7_2.3.x86_64.rpm
    MD5: 3ace733250014c6c42181ef6b086fd93SHA-256: 5cafbcc03264c6274a0855be353b5e34ea980692e1fd43c9af27985c5bd3ec20
 
Red Hat Enterprise Linux HPC Node EUS (v. 7.2)

SRPMS:
openssl098e-0.9.8e-29.el7_2.3.src.rpm
    MD5: 2721d6830e0cd8db2d8e8732a8dc818cSHA-256: f78ccf8fb133b85f51094434fa581d46373af888f7283678222967af12c3b600
 
x86_64:
openssl098e-0.9.8e-29.el7_2.3.i686.rpm
    MD5: ddb190a2a03f7e6eb4cf3aaf2500819eSHA-256: a35fc00f41fc25a3dca1aab049794a30d646fabd6dd3a488dfb34cbb293eb053
openssl098e-0.9.8e-29.el7_2.3.x86_64.rpm
    MD5: 2138994040af4f8dbabd6ee318b2d9cdSHA-256: 63c43f42d781b3932a33e5de5eb1084e546712c0b38c6f1ad0df2e69fc3df9fb
openssl098e-debuginfo-0.9.8e-29.el7_2.3.i686.rpm
    MD5: 03cd4f520865f9b3059481aedab4d5a9SHA-256: cedbdff1be37d3dc07aa47f8a42fb4467b8eb95d092b894dc2fd09452a560320
openssl098e-debuginfo-0.9.8e-29.el7_2.3.x86_64.rpm
    MD5: 3ace733250014c6c42181ef6b086fd93SHA-256: 5cafbcc03264c6274a0855be353b5e34ea980692e1fd43c9af27985c5bd3ec20
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
openssl098e-0.9.8e-20.el6_7.1.src.rpm
    MD5: 3599347328567ef169e87f2f642652a5SHA-256: 5caa21e1875e0fabdfaccd8e728ce542331a641464328ad74527c9e3f7fbfce3
 
IA-32:
openssl098e-0.9.8e-20.el6_7.1.i686.rpm
    MD5: 7abeb2fae0ff24f9964bac0f0571186bSHA-256: ffb88e988415fd6ab98bb9c9c7d5f285a6f56f8ed93bced16fff660befc6d101
openssl098e-debuginfo-0.9.8e-20.el6_7.1.i686.rpm
    MD5: b045a964fae8756498181a9cbed97c34SHA-256: 2862847ecc488a23bc5bfc39f725a213ccf6720a5aa1be9948be77b1bf082c67
 
PPC:
openssl098e-0.9.8e-20.el6_7.1.ppc.rpm
    MD5: 35be9a5ac1051e32e4bae0e67d3a3704SHA-256: c30342c246b2f9e533221aa2c56cbbafcc6c6f3c9f1e97ecd8d4b762c80c2f18
openssl098e-0.9.8e-20.el6_7.1.ppc64.rpm
    MD5: cfdd4fa7f861faf2564ae130b8b6168bSHA-256: e458bf5e05dd7870f36a26c2e5d8480c2aed9f4fc4df00b56e9280bac935258c
openssl098e-debuginfo-0.9.8e-20.el6_7.1.ppc.rpm
    MD5: c2dc56c27a874ddce6c33e6b153eeac8SHA-256: 54a23ed93f4c2c3c7bf02097341ca9811a7bfba8be83eff8a0d2dfcca3b15903
openssl098e-debuginfo-0.9.8e-20.el6_7.1.ppc64.rpm
    MD5: 671c4643d1b14ac5c9e520a92921a9daSHA-256: 136a216705185846e07ef3ace19054167edca1cc73d51e1552c0c9548a35091b
 
s390x:
openssl098e-0.9.8e-20.el6_7.1.s390.rpm
    MD5: bb61edb8b7428630a5d53ef7acac0060SHA-256: 83c8755a1b838debfc8f6704f14cd1f33b1160cf13072faa2110d9630a1e5365
openssl098e-0.9.8e-20.el6_7.1.s390x.rpm
    MD5: dda51e0172aeba4d8ab8b34b78c41f5dSHA-256: 9794576ff4eb7925bc7339f9e41c898bb7265bcb4283f00a949493e17767cb83
openssl098e-debuginfo-0.9.8e-20.el6_7.1.s390.rpm
    MD5: 60eacbb96c99e50129e5457582e3f79eSHA-256: 70cc6b805de89d9d6a433430055c1a4fbded08e69cee0ef2d709665bd3d4e653
openssl098e-debuginfo-0.9.8e-20.el6_7.1.s390x.rpm
    MD5: 20aedd58e528879e06e21abc4db25053SHA-256: 61673a43aa9f0bf1d14405c62a0732a47d1b923108cf1d70ff906032553091fd
 
x86_64:
openssl098e-0.9.8e-20.el6_7.1.i686.rpm
    MD5: 7abeb2fae0ff24f9964bac0f0571186bSHA-256: ffb88e988415fd6ab98bb9c9c7d5f285a6f56f8ed93bced16fff660befc6d101
openssl098e-0.9.8e-20.el6_7.1.x86_64.rpm
    MD5: bc93d8faa5728cc9d6d547e03b3ceefbSHA-256: 3ca150298dfc9a4a4c0f56d08e7f3699164cc07a0d78b484607c794398cab689
openssl098e-debuginfo-0.9.8e-20.el6_7.1.i686.rpm
    MD5: b045a964fae8756498181a9cbed97c34SHA-256: 2862847ecc488a23bc5bfc39f725a213ccf6720a5aa1be9948be77b1bf082c67
openssl098e-debuginfo-0.9.8e-20.el6_7.1.x86_64.rpm
    MD5: 1a8248fad52e2ca04e23f16d251d913bSHA-256: 88ecb7ee3f9e0e625761d85f580d03ee2c9bc3a7f060d0586b734719c4e95990
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
openssl098e-0.9.8e-29.el7_2.3.src.rpm
    MD5: 2721d6830e0cd8db2d8e8732a8dc818cSHA-256: f78ccf8fb133b85f51094434fa581d46373af888f7283678222967af12c3b600
 
PPC:
openssl098e-0.9.8e-29.el7_2.3.ppc.rpm
    MD5: 80cb593eb7c1f9fdb62cead5096db221SHA-256: 8fccbcbedbe1a3513da51425d40a5db88a3aab9363a1b4e5c1ff8a2e60d1f1c5
openssl098e-0.9.8e-29.el7_2.3.ppc64.rpm
    MD5: 8957877825300168999ecc5cc4a58900SHA-256: f99013c3682d0bea14b6ccd53b608b7c2f89d684f2bff3d8c52dc48f3528b71b
openssl098e-debuginfo-0.9.8e-29.el7_2.3.ppc.rpm
    MD5: 8cea47db88cd2787dce8bd63d21cd1f7SHA-256: acc286dbb1995d2e96c7b1f0ebeec0403527b65c9194219592db3fdad70b46ef
openssl098e-debuginfo-0.9.8e-29.el7_2.3.ppc64.rpm
    MD5: e27b7f87be6acc4844d3c57384af5e3dSHA-256: 8e65ef08a00d83524b1c32a936aa2469ae1b965580634c65d281cd6ae461bb73
 
s390x:
openssl098e-0.9.8e-29.el7_2.3.s390.rpm
    MD5: 55b89f53d3052325b38b488159a5c3efSHA-256: 1306dbd0f773c016a44346320fdf0dddb6d58d8509c71edb970eb450163dd5e4
openssl098e-0.9.8e-29.el7_2.3.s390x.rpm
    MD5: a638944371a9a93dcfb372ed2ab3641eSHA-256: 2607f0c6a89377c6e07d820895b4ce6feab618945e0a502d51a136f57e0d8e8a
openssl098e-debuginfo-0.9.8e-29.el7_2.3.s390.rpm
    MD5: 980c335e5f8eae0a8d36e418226d8e91SHA-256: b8a1ded67898108134e31ec4f96001e8565e5a5bc315c14ec7dee6986888830c
openssl098e-debuginfo-0.9.8e-29.el7_2.3.s390x.rpm
    MD5: 4b1d4d05e2382c9e4834083aec7c4440SHA-256: 0104b2d1baf52f911adc04d3d8e947ff85db05109951a1d02c9d53cec7bca3f7
 
x86_64:
openssl098e-0.9.8e-29.el7_2.3.i686.rpm
    MD5: ddb190a2a03f7e6eb4cf3aaf2500819eSHA-256: a35fc00f41fc25a3dca1aab049794a30d646fabd6dd3a488dfb34cbb293eb053
openssl098e-0.9.8e-29.el7_2.3.x86_64.rpm
    MD5: 2138994040af4f8dbabd6ee318b2d9cdSHA-256: 63c43f42d781b3932a33e5de5eb1084e546712c0b38c6f1ad0df2e69fc3df9fb
openssl098e-debuginfo-0.9.8e-29.el7_2.3.i686.rpm
    MD5: 03cd4f520865f9b3059481aedab4d5a9SHA-256: cedbdff1be37d3dc07aa47f8a42fb4467b8eb95d092b894dc2fd09452a560320
openssl098e-debuginfo-0.9.8e-29.el7_2.3.x86_64.rpm
    MD5: 3ace733250014c6c42181ef6b086fd93SHA-256: 5cafbcc03264c6274a0855be353b5e34ea980692e1fd43c9af27985c5bd3ec20
 
Red Hat Enterprise Linux Server AUS (v. 7.2)

SRPMS:
openssl098e-0.9.8e-29.el7_2.3.src.rpm
    MD5: 2721d6830e0cd8db2d8e8732a8dc818cSHA-256: f78ccf8fb133b85f51094434fa581d46373af888f7283678222967af12c3b600
 
x86_64:
openssl098e-0.9.8e-29.el7_2.3.i686.rpm
    MD5: ddb190a2a03f7e6eb4cf3aaf2500819eSHA-256: a35fc00f41fc25a3dca1aab049794a30d646fabd6dd3a488dfb34cbb293eb053
openssl098e-0.9.8e-29.el7_2.3.x86_64.rpm
    MD5: 2138994040af4f8dbabd6ee318b2d9cdSHA-256: 63c43f42d781b3932a33e5de5eb1084e546712c0b38c6f1ad0df2e69fc3df9fb
openssl098e-debuginfo-0.9.8e-29.el7_2.3.i686.rpm
    MD5: 03cd4f520865f9b3059481aedab4d5a9SHA-256: cedbdff1be37d3dc07aa47f8a42fb4467b8eb95d092b894dc2fd09452a560320
openssl098e-debuginfo-0.9.8e-29.el7_2.3.x86_64.rpm
    MD5: 3ace733250014c6c42181ef6b086fd93SHA-256: 5cafbcc03264c6274a0855be353b5e34ea980692e1fd43c9af27985c5bd3ec20
 
Red Hat Enterprise Linux Server EUS (v. 6.7.z)

SRPMS:
openssl098e-0.9.8e-20.el6_7.1.src.rpm
    MD5: 3599347328567ef169e87f2f642652a5SHA-256: 5caa21e1875e0fabdfaccd8e728ce542331a641464328ad74527c9e3f7fbfce3
 
IA-32:
openssl098e-0.9.8e-20.el6_7.1.i686.rpm
    MD5: 7abeb2fae0ff24f9964bac0f0571186bSHA-256: ffb88e988415fd6ab98bb9c9c7d5f285a6f56f8ed93bced16fff660befc6d101
openssl098e-debuginfo-0.9.8e-20.el6_7.1.i686.rpm
    MD5: b045a964fae8756498181a9cbed97c34SHA-256: 2862847ecc488a23bc5bfc39f725a213ccf6720a5aa1be9948be77b1bf082c67
 
PPC:
openssl098e-0.9.8e-20.el6_7.1.ppc.rpm
    MD5: 35be9a5ac1051e32e4bae0e67d3a3704SHA-256: c30342c246b2f9e533221aa2c56cbbafcc6c6f3c9f1e97ecd8d4b762c80c2f18
openssl098e-0.9.8e-20.el6_7.1.ppc64.rpm
    MD5: cfdd4fa7f861faf2564ae130b8b6168bSHA-256: e458bf5e05dd7870f36a26c2e5d8480c2aed9f4fc4df00b56e9280bac935258c
openssl098e-debuginfo-0.9.8e-20.el6_7.1.ppc.rpm
    MD5: c2dc56c27a874ddce6c33e6b153eeac8SHA-256: 54a23ed93f4c2c3c7bf02097341ca9811a7bfba8be83eff8a0d2dfcca3b15903
openssl098e-debuginfo-0.9.8e-20.el6_7.1.ppc64.rpm
    MD5: 671c4643d1b14ac5c9e520a92921a9daSHA-256: 136a216705185846e07ef3ace19054167edca1cc73d51e1552c0c9548a35091b
 
s390x:
openssl098e-0.9.8e-20.el6_7.1.s390.rpm
    MD5: bb61edb8b7428630a5d53ef7acac0060SHA-256: 83c8755a1b838debfc8f6704f14cd1f33b1160cf13072faa2110d9630a1e5365
openssl098e-0.9.8e-20.el6_7.1.s390x.rpm
    MD5: dda51e0172aeba4d8ab8b34b78c41f5dSHA-256: 9794576ff4eb7925bc7339f9e41c898bb7265bcb4283f00a949493e17767cb83
openssl098e-debuginfo-0.9.8e-20.el6_7.1.s390.rpm
    MD5: 60eacbb96c99e50129e5457582e3f79eSHA-256: 70cc6b805de89d9d6a433430055c1a4fbded08e69cee0ef2d709665bd3d4e653
openssl098e-debuginfo-0.9.8e-20.el6_7.1.s390x.rpm
    MD5: 20aedd58e528879e06e21abc4db25053SHA-256: 61673a43aa9f0bf1d14405c62a0732a47d1b923108cf1d70ff906032553091fd
 
x86_64:
openssl098e-0.9.8e-20.el6_7.1.i686.rpm
    MD5: 7abeb2fae0ff24f9964bac0f0571186bSHA-256: ffb88e988415fd6ab98bb9c9c7d5f285a6f56f8ed93bced16fff660befc6d101
openssl098e-0.9.8e-20.el6_7.1.x86_64.rpm
    MD5: bc93d8faa5728cc9d6d547e03b3ceefbSHA-256: 3ca150298dfc9a4a4c0f56d08e7f3699164cc07a0d78b484607c794398cab689
openssl098e-debuginfo-0.9.8e-20.el6_7.1.i686.rpm
    MD5: b045a964fae8756498181a9cbed97c34SHA-256: 2862847ecc488a23bc5bfc39f725a213ccf6720a5aa1be9948be77b1bf082c67
openssl098e-debuginfo-0.9.8e-20.el6_7.1.x86_64.rpm
    MD5: 1a8248fad52e2ca04e23f16d251d913bSHA-256: 88ecb7ee3f9e0e625761d85f580d03ee2c9bc3a7f060d0586b734719c4e95990
 
Red Hat Enterprise Linux Server EUS (v. 7.2)

SRPMS:
openssl098e-0.9.8e-29.el7_2.3.src.rpm
    MD5: 2721d6830e0cd8db2d8e8732a8dc818cSHA-256: f78ccf8fb133b85f51094434fa581d46373af888f7283678222967af12c3b600
 
PPC:
openssl098e-0.9.8e-29.el7_2.3.ppc.rpm
    MD5: 80cb593eb7c1f9fdb62cead5096db221SHA-256: 8fccbcbedbe1a3513da51425d40a5db88a3aab9363a1b4e5c1ff8a2e60d1f1c5
openssl098e-0.9.8e-29.el7_2.3.ppc64.rpm
    MD5: 8957877825300168999ecc5cc4a58900SHA-256: f99013c3682d0bea14b6ccd53b608b7c2f89d684f2bff3d8c52dc48f3528b71b
openssl098e-debuginfo-0.9.8e-29.el7_2.3.ppc.rpm
    MD5: 8cea47db88cd2787dce8bd63d21cd1f7SHA-256: acc286dbb1995d2e96c7b1f0ebeec0403527b65c9194219592db3fdad70b46ef
openssl098e-debuginfo-0.9.8e-29.el7_2.3.ppc64.rpm
    MD5: e27b7f87be6acc4844d3c57384af5e3dSHA-256: 8e65ef08a00d83524b1c32a936aa2469ae1b965580634c65d281cd6ae461bb73
 
s390x:
openssl098e-0.9.8e-29.el7_2.3.s390.rpm
    MD5: 55b89f53d3052325b38b488159a5c3efSHA-256: 1306dbd0f773c016a44346320fdf0dddb6d58d8509c71edb970eb450163dd5e4
openssl098e-0.9.8e-29.el7_2.3.s390x.rpm
    MD5: a638944371a9a93dcfb372ed2ab3641eSHA-256: 2607f0c6a89377c6e07d820895b4ce6feab618945e0a502d51a136f57e0d8e8a
openssl098e-debuginfo-0.9.8e-29.el7_2.3.s390.rpm
    MD5: 980c335e5f8eae0a8d36e418226d8e91SHA-256: b8a1ded67898108134e31ec4f96001e8565e5a5bc315c14ec7dee6986888830c
openssl098e-debuginfo-0.9.8e-29.el7_2.3.s390x.rpm
    MD5: 4b1d4d05e2382c9e4834083aec7c4440SHA-256: 0104b2d1baf52f911adc04d3d8e947ff85db05109951a1d02c9d53cec7bca3f7
 
x86_64:
openssl098e-0.9.8e-29.el7_2.3.i686.rpm
    MD5: ddb190a2a03f7e6eb4cf3aaf2500819eSHA-256: a35fc00f41fc25a3dca1aab049794a30d646fabd6dd3a488dfb34cbb293eb053
openssl098e-0.9.8e-29.el7_2.3.x86_64.rpm
    MD5: 2138994040af4f8dbabd6ee318b2d9cdSHA-256: 63c43f42d781b3932a33e5de5eb1084e546712c0b38c6f1ad0df2e69fc3df9fb
openssl098e-debuginfo-0.9.8e-29.el7_2.3.i686.rpm
    MD5: 03cd4f520865f9b3059481aedab4d5a9SHA-256: cedbdff1be37d3dc07aa47f8a42fb4467b8eb95d092b894dc2fd09452a560320
openssl098e-debuginfo-0.9.8e-29.el7_2.3.x86_64.rpm
    MD5: 3ace733250014c6c42181ef6b086fd93SHA-256: 5cafbcc03264c6274a0855be353b5e34ea980692e1fd43c9af27985c5bd3ec20
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
openssl098e-0.9.8e-20.el6_7.1.src.rpm
    MD5: 3599347328567ef169e87f2f642652a5SHA-256: 5caa21e1875e0fabdfaccd8e728ce542331a641464328ad74527c9e3f7fbfce3
 
IA-32:
openssl098e-0.9.8e-20.el6_7.1.i686.rpm
    MD5: 7abeb2fae0ff24f9964bac0f0571186bSHA-256: ffb88e988415fd6ab98bb9c9c7d5f285a6f56f8ed93bced16fff660befc6d101
openssl098e-debuginfo-0.9.8e-20.el6_7.1.i686.rpm
    MD5: b045a964fae8756498181a9cbed97c34SHA-256: 2862847ecc488a23bc5bfc39f725a213ccf6720a5aa1be9948be77b1bf082c67
 
x86_64:
openssl098e-0.9.8e-20.el6_7.1.i686.rpm
    MD5: 7abeb2fae0ff24f9964bac0f0571186bSHA-256: ffb88e988415fd6ab98bb9c9c7d5f285a6f56f8ed93bced16fff660befc6d101
openssl098e-0.9.8e-20.el6_7.1.x86_64.rpm
    MD5: bc93d8faa5728cc9d6d547e03b3ceefbSHA-256: 3ca150298dfc9a4a4c0f56d08e7f3699164cc07a0d78b484607c794398cab689
openssl098e-debuginfo-0.9.8e-20.el6_7.1.i686.rpm
    MD5: b045a964fae8756498181a9cbed97c34SHA-256: 2862847ecc488a23bc5bfc39f725a213ccf6720a5aa1be9948be77b1bf082c67
openssl098e-debuginfo-0.9.8e-20.el6_7.1.x86_64.rpm
    MD5: 1a8248fad52e2ca04e23f16d251d913bSHA-256: 88ecb7ee3f9e0e625761d85f580d03ee2c9bc3a7f060d0586b734719c4e95990
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
openssl098e-0.9.8e-29.el7_2.3.src.rpm
    MD5: 2721d6830e0cd8db2d8e8732a8dc818cSHA-256: f78ccf8fb133b85f51094434fa581d46373af888f7283678222967af12c3b600
 
x86_64:
openssl098e-0.9.8e-29.el7_2.3.i686.rpm
    MD5: ddb190a2a03f7e6eb4cf3aaf2500819eSHA-256: a35fc00f41fc25a3dca1aab049794a30d646fabd6dd3a488dfb34cbb293eb053
openssl098e-0.9.8e-29.el7_2.3.x86_64.rpm
    MD5: 2138994040af4f8dbabd6ee318b2d9cdSHA-256: 63c43f42d781b3932a33e5de5eb1084e546712c0b38c6f1ad0df2e69fc3df9fb
openssl098e-debuginfo-0.9.8e-29.el7_2.3.i686.rpm
    MD5: 03cd4f520865f9b3059481aedab4d5a9SHA-256: cedbdff1be37d3dc07aa47f8a42fb4467b8eb95d092b894dc2fd09452a560320
openssl098e-debuginfo-0.9.8e-29.el7_2.3.x86_64.rpm
    MD5: 3ace733250014c6c42181ef6b086fd93SHA-256: 5cafbcc03264c6274a0855be353b5e34ea980692e1fd43c9af27985c5bd3ec20
 
(The unlinked packages above are only available from the Red Hat Network)

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: