Thursday, January 18, 2018

RHSA-2014:0629-1: Important: rhev-hypervisor6 security update

An updated rhev-hypervisor6 package that fixes two security issues isnow available.The Red Hat Security Response Team has rated this update as havingImportant security impact. Common Vulnerability Scoring System (CVSS) basescores, which give detailed ...

JSA10629 – 2014-06 Out of Cycle Security Bulletin: Vulnerabilities in OpenSSL...

OpenSSL published an advisory on June 5th regarding following seven vulnerabilities that have been fixed in OpenSSL versions 0.9.8za, 1.0.0m and 1.0.1h.Following is a summary of vulnerabilities and their status with respect to Juniper products:CVE-2014-0224 SSL/TLS MITM vulnerability An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. The attack can only be performed between a vulnerable client and server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Junos OS: Any product or platform running Junos OS versions prior to 14.1 are vulnerable to this issue (PR 999736).Following Secure Access software versions are vulnerable (PR 1000219):IVEOS 8.0 prior to 8.0R4.1IVEOS 7.4 prior to 7.4R11.1UACOS C4.4 prior to C4.4r11.1UACOS C5.0 prior to C5.0r4.1Following Pulse Desktop versions are vulnerable (PR 1000143):5.0 prior to 5.0R4.14.0 prior to 4.0R11.1Secure Access software versions 7.1rX, 7.2rX and 7.3rX are not vulnerable on the server side when clients are used to access Secure Access server with those versions.All Network Connect FIPS versions are vulnerable.All versions Linux Network Connect are vulnerableNetwork Connect for Mac OS X is vulnerable only if openssl version provided by Mac OS X system is vulnerable.All versions of Host Checker are vulnerable.All JSAM (Java Secure Application Manager) versions are NOT vulnerable.All WSAM (Windows Secure Application Manager) versions are NOT vulnerable.All Junos Pulse (Mobile) for iOS FIPS versions are vulnerable (PR 1000204).All Junos Pulse (Mobile) for Android versions are vulnerable.All versions of Junos Space are vulnerable (PR 999804).Junos WebApp Secure (JWAS) is vulnerable (PR 1000088).SBR enterprise 6.10-6.17 are vulnerable. Please see KB29217 for more information on this product.ScreenOS is not vulnerable (PR 999772) - ScreenOS Web UI is not vulnerable and all Juniper servers that ScreenOS can connect to have been verified to be not vulnerable, hence ScreenOS is not vulnerable.Windows Network Connect (Non-FIPS) versions are not vulnerable.Junos Pulse (iOS) Non-FIPS versions are not vulnerable.Windows In-Box Junos Pulse Client on Windows 8.1 is not vulnerable.Junos Pulse (Mobile) for Windows Phone 8.1 versions is not vulnerable. CVE-2014-0198 SSL_MODE_RELEASE_BUFFERS NULL pointer dereference A flaw in the do_ssl3_write function can allow remote attackers to cause a denial of service via a NULL pointer dereference. This flaw only affects OpenSSL 1.0.0 and 1.0.1 where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common. All versions of Junos OS running on any product or platform running are vulnerable (PR 988917).Following Secure Access versions are vulnerable (PR 988916):IVEOS 8.0 prior to 8.0R4.1IVEOS 7.4 prior to 7.4R11.1UACOS C4.4 prior to C4.4r11.1UACOS C5.0 prior to C5.0r4.1Secure Access software versions 7.1, 7.2 and 7.3 are not vulnerable.Junos WebApp Secure (JWAS) is vulnerable (PR 1000088).Junos Space is not vulnerable.ScreenOS is not vulnerable.CVE-2010-5298 SSL_MODE_RELEASE_BUFFERS session injection or denial of service A race condition in the ssl3_read_bytes function can allow remote attackers to inject data across sessions or cause a denial of service. This flaw only affects multithreaded applications using OpenSSL 1.0.0 and 1.0.1, where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common.Junos OS: Any product or platform running Junos OS versions prior to 14.1 are vulnerable to this issue (PR 984416).Following Secure Access versions are vulnerable (PR 986446):IVEOS 8.0 prior to 8.0r4IVEOS 7.4 prior to 7.4r11UACOS C4.4 prior to C4.4r11.1UACOS C5.0 prior to C5.0r4.1Secure Access software versions 7.1, 7.2 and 7.3 are not vulnerable.Junos WebApp Secure (JWAS) is vulnerable (PR 1000088).Junos Space is not vulnerable.ScreenOS is not vulnerable. CVE-2014-3470 Anonymous ECDH denial of service OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to a denial of service attack. Junos WebApp Secure (JWAS) is vulnerable (PR 1000088).Junos Pulse is not vulnerable.Junos Space is not vulnerable.ScreenOS is not vulnerable.SSL VPN Secure Access software is not vulnerable, however software has been updated to include OpenSSL changes for this issue.Junos OS is not vulnerable.CVE-2014-0076 ECDSA nonce disclosure using side-channel attack The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack. Junos OS: Any product or platform running Junos OS versions prior to 13.3 are vulnerable to this issue (PR 982853).Junos WebApp Secure (JWAS) is vulnerable (PR 1000088).ScreenOS is vulnerable (PR 999772).Junos Space is not vulnerable.SSL VPN Secure Access software is not vulnerableUnified Access Control software is not vulnerableSA Series SSL VPN Virtual Appliance is vulnerable.Junos Pulse for windows is vulnerable. CVE-2014-0221 DTLS recursion flaw By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. Only applications using OpenSSL as a DTLS client are affected. Juniper SIRT is not aware of any Juniper products that use DTLS for communication. Juniper products are not vulnerable to this issue. Junos OS, SSL VPN products, ScreenOS, Junos Space, Junos WebApp Secure (JWAS) are not vulnerable to this issue.CVE-2014-0195 DTLS invalid fragment vulnerability A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Only applications using OpenSSL as a DTLS client or server affected. Juniper SIRT is not aware of any Juniper products that use DTLS for communication. Juniper products are not vulnerable to this issue. Junos OS, SSL VPN products, ScreenOS, Junos Space, Junos WebApp Secure (JWAS) are not vulnerable to this issue.Products not vulnerable to any of the above issues:ADC Software is not vulnerableSmartPass is not vulnerableJunosE is not vulnerableWX/WXC series is not vulnerableJuniper is investigating our product portfolio for affected software that is not mentioned above. As new information becomes available this document will be updated.Modification History:June 5, 2014: Initial releaseJune 6, 2014: Included status of ScreenOS, Junos SpaceJune 10, 2014: Included UAC/SA/Pulse information in solution section, updated status of ScreenOS.June 12, 2014: Included status of Junos WebApp Secure (JWAS).July 1, 2014: Included status of WX/WXC series.July 29, 2014: Updated available Junos OS resolution releases.September 4th, 2014: Fixed grammatical error in ScreenOS problem section.SA (SSL VPN) CVE-2014-0224 SSL/TLS MITM vulnerability Fixes for this issue are found in IVEOS 8.0r4.1 and 7.4r11.1,For more information on solution available for this platform please see KB: http://kb.juniper.net/KB29195CVE-2014-0198 SSL_MODE_RELEASE_BUFFERS NULL pointer dereference Fixes for this issue are found in IVEOS 7.4R11.1 and 8.0R4.1.CVE-2010-5298 SSL_MODE_RELEASE_BUFFERS session injection or denial of service Fixes for this issue are found in IVEOS 7.4R11 and 8.0R4.CVE-2014-3470 Anonymous ECDH denial of service Fixes for this issue are found in IVEOS  7.1r19.1, 7.4R11.1 and 8.0R4.1.SA Series SSL VPN Virtual Appliance Fixes for this platform are in progress. We plan to add a fix in a future SA major release. UAC/IC CVE-2014-0224 SSL/TLS MITM vulnerability Fixes for this issue are found in UACOS C4.4r11.1 and C5.0r41.1.CVE-2014-0198 SSL_MODE_RELEASE_BUFFERS NULL pointer dereference Fixes for this issue are found in UACOS C4.4r11.1 and C5.0r41.1.CVE-2010-5298 SSL_MODE_RELEASE_BUFFERS session injection or denial of service Fixes for this issue are found in UACOS C4.4r11.1 and C5.0r41.1.CVE-2014-3470 Anonymous ECDH denial of service Fixes for this issue are found in UACOS C4.4r11.1 and C5.0r41.1.Junos Pulse CVE-2014-0224 SSL/TLS MITM vulnerability Fixes for this issue are found in 5.0r4.1 and 4.0r11.1.For more information on solution available for this platform please see KB: http://kb.juniper.net/KB29195CVE-2014-0076 ECDSA nonce disclosure using side-channel attack Fixes for this issue are planned for a future release (5.1r1) No ETA is set at this time.IDP SignaturesJuniper has released signatures to detect attempts to exploit CVE-2014-0224: Junos OSCVE-2014-0224 SSL/TLS MITM vulnerability This issue is fixed in 11.4R12-S1, 12.1X46-D20, 13.1R4-S2, 13.2R5, 13.3R2-S3, 13.3R3, 14.1R1 and all subsequent releases. Even though CVE-2014-0221, CVE-2014-0195 and CVE-2014-3470 do not affect Junos, changes to resolve these issues are included along with the fix for CVE-2014-0224.A fix release is pending for Junos 12.1X44, 12.1X47, 12.2 and 12.3.CVE-2014-0198 SSL_MODE_RELEASE_BUFFERS NULL pointer dereference This is fixed in 12.1X46-D20 and 13.3R3.A fix release is pending for other supported Junos releases.CVE-2010-5298 SSL_MODE_RELEASE_BUFFERS session injection or denial of service This is fixed in 12.1X46-D20, 12.3R7, 13.2R5, 13.3R2-S3, 13.3R3, 14.1R1 and all subsequent releases.A fix release is pending for Junos 11.4, 12.1X44, 12.1X47, 12.2, 13.1.CVE-2014-0076 ECDSA nonce disclosure using side-channel attack This is fixed in 11.4R12-S1, 12.1X46-D20, 12.1X47-D10, 12.3R7, 13.3R1 and all subsequent releases.A fix release is pending for Junos 12.1X44, 12.2, 13.1, 13.2. We are currently investigating our product portfolio for affected software and will work to provide fixes for any software that is found to be vulnerable. Any available solution to particular CVEs is listed in the Problem section above.Junos OS:Since SSL is used for remote network configuration and management applications such as J-Web and SSL Service for JUNOScript (XNM-SSL), viable workarounds for this issue in Junos may include: Disabling J-WebDisable SSL service for JUNOScript and only use Netconf, which makes use of SSH, to make configuration changesLimit access to J-Web and XNM-SSL from only trusted networkWorkaround for CVE-2014-0076:Since this vulnerability requires an attacker to have a local account on the device and be able to execute arbitrary code, limiting access to only trusted users should completely mitigate the issue on affected devices.A network based attacker who can conduct man-in-the-middle type of attacks can decrypt or modify encrypted traffic. This may contains sensitive information that can be leveraged to conduct additional attacks.

VU#978508: OpenSSL is vulnerable to a man-in-the-middle attack

OpenSSL is vulnerable to a man-in-the-middle attack.

RHSA-2014:0628-1: Important: openssl security update

Updated openssl packages that fix multiple security issues are nowavailable for Red Hat Storage 2.1.The Red Hat Security Response Team has rated this update as havingImportant security impact. Common Vulnerability Scoring System (CVSS) basescores, which give detailed severity ratings, are available for eachvulnerability from the CVE links in the References section. OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)and Transport Layer Security (TLS v1) protocols, as well as afull-strength, general purpose cryptography library.It was found that OpenSSL clients and servers could be forced, via aspecially crafted handshake packet, to use weak keying material forcommunication. A man-in-the-middle attacker could use this flaw to decryptand modify traffic between a client and a server. (CVE-2014-0224)Note: In order to exploit this flaw, both the server and the client must beusing a vulnerable version of OpenSSL; the server must be using OpenSSLversion 1.0.1 and above, and the client must be using any version ofOpenSSL. For more information about this flaw, refer to:https://access.redhat.com/site/articles/904433A buffer overflow flaw was found in the way OpenSSL handled invalid DTLSpacket fragments. A remote attacker could possibly use this flaw to executearbitrary code on a DTLS client or server. (CVE-2014-0195)Multiple flaws were found in the way OpenSSL handled read and write bufferswhen the SSL_MODE_RELEASE_BUFFERS mode was enabled. A TLS/SSL client orserver using OpenSSL could crash or unexpectedly drop connections whenprocessing certain SSL traffic. (CVE-2010-5298, CVE-2014-0198)A denial of service flaw was found in the way OpenSSL handled certain DTLSServerHello requests. A specially crafted DTLS handshake packet could causea DTLS client using OpenSSL to crash. (CVE-2014-0221)A NULL pointer dereference flaw was found in the way OpenSSL performedanonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A speciallycrafted handshake packet could cause a TLS/SSL client that has theanonymous ECDH cipher suite enabled to crash. (CVE-2014-3470)Red Hat would like to thank the OpenSSL project for reporting these issues.Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporterof CVE-2014-0224, Jüri Aedla as the original reporter of CVE-2014-0195,Imre Rad of Search-Lab as the original reporter of CVE-2014-0221, and FelixGröbert and Ivan Fratrić of Google as the original reporters ofCVE-2014-3470.All OpenSSL users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. For the update to takeeffect, all services linked to the OpenSSL library (such as httpd and otherSSL-enabled services) must be restarted or the system rebooted. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258 1087195 - CVE-2010-5298 openssl: freelist misuse causing a possible use-after-free1093837 - CVE-2014-0198 openssl: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference in do_ssl3_write()1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability1103593 - CVE-2014-0221 openssl: DoS when sending invalid DTLS handshake1103598 - CVE-2014-0195 openssl: Buffer overflow via DTLS invalid fragment1103600 - CVE-2014-3470 openssl: client-side denial of service when using anonymous ECDH These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2014:0627-1: Important: openssl security update

Red Hat Enterprise Linux ELS (v. 4) SRPMS: openssl-0.9.7a-43.22.el4.src.rpm     MD5: 17bf6c1b899425a7d8b4c81210c51efaSHA-256: 3641f7f41c2c2b6710338c694a63381626c2b7f75d66e8cae549eff7e81e1825   IA-32: openssl-0.9.7a-43.22.el4.i386.rpm     MD5: 49b1bf276a6e037611fc81c1a1c8f938SHA-256: 37c62f3bd62d671ff02f58662304c15ef15c8962b3bf2538a71da3a5ddb8bbb0 openssl-0.9.7a-43.22.el4.i686.rpm     MD5: 20f0c8b58cfa7332babdc60db589e8b2SHA-256: e0b0bf36e912930a5644016678daffe19d31e6839fbb2bc30baca6fc0ed98095 openssl-devel-0.9.7a-43.22.el4.i386.rpm     MD5: 0a17808ae85a4f668be256d13427cdc4SHA-256: 57d787d56b4e6751edfdf84d1a43d459a3f7d01f9e836b0d817a909935b3a6b2 openssl-perl-0.9.7a-43.22.el4.i386.rpm     MD5: 18f2d015efe54cf029fcbf282410eb16SHA-256: 964e754547b8ae3a3448f4d5b12097bc6cf600b466f787f6361471172849dd73   IA-64: openssl-0.9.7a-43.22.el4.i686.rpm     MD5: 20f0c8b58cfa7332babdc60db589e8b2SHA-256: e0b0bf36e912930a5644016678daffe19d31e6839fbb2bc30baca6fc0ed98095 openssl-0.9.7a-43.22.el4.ia64.rpm     MD5: 54955c45c253c898d41eec037aedd13bSHA-256: 5c2be75e05606a8884ea68e588ee7732e26d5dbbf20d513b7a2c522841577e4f openssl-devel-0.9.7a-43.22.el4.ia64.rpm     MD5: 76f548bd5ac042ad71c33a1281917686SHA-256: cae3dd37f31861a47f9b524042e0643eb09cf71590ced4d8bad5e68e12e59b7f openssl-perl-0.9.7a-43.22.el4.ia64.rpm     MD5: 3dcc46b4e10379045865b941e705eda4SHA-256: 3b9af076a586a6b85521cbc53ce3be255e9de03e42be188aec6eedc12b2f0c60   x86_64: openssl-0.9.7a-43.22.el4.i686.rpm     MD5: 20f0c8b58cfa7332babdc60db589e8b2SHA-256: e0b0bf36e912930a5644016678daffe19d31e6839fbb2bc30baca6fc0ed98095 openssl-0.9.7a-43.22.el4.x86_64.rpm     MD5: 60f2e587ed45524b5fb65e71321a25d9SHA-256: 406501cf98618b71c69595eaaf20701eeb8f7447923fa0463ddba4ca5b083453 openssl-devel-0.9.7a-43.22.el4.i386.rpm     MD5: 0a17808ae85a4f668be256d13427cdc4SHA-256: 57d787d56b4e6751edfdf84d1a43d459a3f7d01f9e836b0d817a909935b3a6b2 openssl-devel-0.9.7a-43.22.el4.x86_64.rpm     MD5: 5c679f2fb2df78b0754291458d959936SHA-256: 26152b4a70f24a8b07696cd7f46864f119fc9632df299270200900a052f579e0 openssl-perl-0.9.7a-43.22.el4.x86_64.rpm     MD5: a7a110f62ba2cf01177ea984303ac5aaSHA-256: 7ad832a902b8ab9ddb2b28b767b9eff53e8162462a818edd4c988f4c991cdf68   Red Hat Enterprise Linux EUS (v. 5.9.z server) SRPMS: openssl-0.9.8e-26.el5_9.4.src.rpm     MD5: c192647e844cd6568580f9b0efac330fSHA-256: 7894cf1b7ee880433afbf147b532bdee488ee18477275ba9dd20df8ec90cbbb1   IA-32: openssl-0.9.8e-26.el5_9.4.i386.rpm     MD5: 066fa7c6a5e45d13ebd0b21f3ce0f5a3SHA-256: 9ed34f5722ea42f4ea054e75e05b6df8602fc0f8d72422289861370fb82c5e77 openssl-0.9.8e-26.el5_9.4.i686.rpm     MD5: 971a1686558768ab4f3d742064179625SHA-256: cdc7d1e1408cb5616ced42247bb70e40ec5f8b98667420f15fa04349607eb334 openssl-debuginfo-0.9.8e-26.el5_9.4.i386.rpm     MD5: 6a06635d007a39bf3e2ca7d8dd237471SHA-256: 59a5422b46a7900e2960985fc37de505aa8f3ab28f19f82427723bf03d26bf24 openssl-debuginfo-0.9.8e-26.el5_9.4.i686.rpm     MD5: 83bab61f09ff15d3b38ef3f7d45dbbaeSHA-256: 2d459537da138f3a5404d34105104c4c1957b36b780b1fbcb7786864830be89c openssl-devel-0.9.8e-26.el5_9.4.i386.rpm     MD5: ccbe59538439a8d2bbc6797f3fd72d6dSHA-256: 238c6a419e8be6768204d5527fdf0e591722a6581ef51bc8f6ac917d60415be5 openssl-perl-0.9.8e-26.el5_9.4.i386.rpm     MD5: 062ff7cc47f7802c785847c7758b1cfaSHA-256: cb7e3752892d116c54d77eadf5c56c94bb06f7aa3be235f6759f09182d718236   IA-64: openssl-0.9.8e-26.el5_9.4.i686.rpm     MD5: 971a1686558768ab4f3d742064179625SHA-256: cdc7d1e1408cb5616ced42247bb70e40ec5f8b98667420f15fa04349607eb334 openssl-0.9.8e-26.el5_9.4.ia64.rpm     MD5: 0b9197b3d685a2df84916689d9eaedbaSHA-256: a91999ee0050688b5a9e57d1a9771d5496c38a658b02acc66fabc6548d8898b1 openssl-debuginfo-0.9.8e-26.el5_9.4.i686.rpm     MD5: 83bab61f09ff15d3b38ef3f7d45dbbaeSHA-256: 2d459537da138f3a5404d34105104c4c1957b36b780b1fbcb7786864830be89c openssl-debuginfo-0.9.8e-26.el5_9.4.ia64.rpm     MD5: 19c7daa2f1997d99a8caef666fe8e3b1SHA-256: 8325dbf3a0ac8b1d6e7e8d00fd0de840dc46065314e0678476e180a4413bf05d openssl-devel-0.9.8e-26.el5_9.4.ia64.rpm     MD5: 4e0bccd1bf67b9f90be2dda1f01176d3SHA-256: a8a6f8ce8b6efbece19cfdf7c40198a76e8fa98b398b402588233f93149cd4ed openssl-perl-0.9.8e-26.el5_9.4.ia64.rpm     MD5: 895184ab41bb17ed91336ff90a27cd70SHA-256: 69528632d2cdeae148c09e3289d4e5842e9d00f0643aaeb588a9ed422e392d5c   PPC: openssl-0.9.8e-26.el5_9.4.ppc.rpm     MD5: b819636061356bac503c66d74a449f0aSHA-256: 01da6b4fa0045f4355151023f366b241c78706d8e79a5dd19577fe047293469c openssl-0.9.8e-26.el5_9.4.ppc64.rpm     MD5: eb1e0b2f302d2fba770990603c283582SHA-256: 816c186c02759bf79f981eb777ff6153a5ceecec4bb0bdb133e40522a05652ee openssl-debuginfo-0.9.8e-26.el5_9.4.ppc.rpm     MD5: b6fe38dc56599195e7c6e393f9994891SHA-256: 83979edaea50c5dd27f45a0d73bed8485a5d0402707d43f6b27d1ac49c3efa06 openssl-debuginfo-0.9.8e-26.el5_9.4.ppc64.rpm     MD5: d77fdd620367aa32e345b713c28692d9SHA-256: 224f8b31b8852faff3ad0445efaffed97118945cca205e40bee9907e4e953f4e openssl-devel-0.9.8e-26.el5_9.4.ppc.rpm     MD5: befb2614dba501f2e06fc4e3bee70825SHA-256: e738fd5451f14f6a8518d93f3c5d120d1a8465997cfcbef856988901e5c59716 openssl-devel-0.9.8e-26.el5_9.4.ppc64.rpm     MD5: 2b122d8918e8598ea4c1c80b99bc9eb4SHA-256: dc4f8a8ac711d65e3bd4287497094edf239e14671f5e741ec7114753487bbe6e openssl-perl-0.9.8e-26.el5_9.4.ppc.rpm     MD5: ec25c5625c418cb23fd590100e33c7abSHA-256: 4de89889f609d54d5051c7c2497024fa0f1cd348f93900c316e0e04c6774bf04   s390x: openssl-0.9.8e-26.el5_9.4.s390.rpm     MD5: 29518651d28522e2baced0a526c76f73SHA-256: 66d165a377b9c5836a4cccb920fed191423e065893d7bbf180a2b192332b0ea2 openssl-0.9.8e-26.el5_9.4.s390x.rpm     MD5: 1af98abcf8c17965cc069c1d0e745b12SHA-256: 8215cf783fa04f7fe50a97ccdd38aca925342c983cc0453d6bcc9bc4633a6a63 openssl-debuginfo-0.9.8e-26.el5_9.4.s390.rpm     MD5: 967bdcf7b4a2efeb73d001dd5b834731SHA-256: 65ef47ef5459f157d652d20cc29ad00030520d725432c56418138238a5a4e808 openssl-debuginfo-0.9.8e-26.el5_9.4.s390x.rpm     MD5: 12e2a57abb5580784ed9873da4ec0064SHA-256: 33d0223ddea18776b9a7f5f5cadf0a6b0a89de1955594f1129b633308f5807c4 openssl-devel-0.9.8e-26.el5_9.4.s390.rpm     MD5: 6dfce295435cc794185f39a1adf6cf19SHA-256: fec89120643d4263e192f326aea910f7bf39267c33d43f745daa6d0d79447215 openssl-devel-0.9.8e-26.el5_9.4.s390x.rpm     MD5: cee37c30179d425f05e71d095a4c8e98SHA-256: b3399e8d1ea1baacef55ed14b3b5603a43728c791afcf3c7ce2806e9976c582f openssl-perl-0.9.8e-26.el5_9.4.s390x.rpm     MD5: 06dba30adb3f9884f407cba0fb0bd611SHA-256: 3d44b3ec760cd7ea9247cfb3476d573146c55bd9095398a40992b80ad9f5cc8c   x86_64: openssl-0.9.8e-26.el5_9.4.i686.rpm     MD5: 971a1686558768ab4f3d742064179625SHA-256: cdc7d1e1408cb5616ced42247bb70e40ec5f8b98667420f15fa04349607eb334 openssl-0.9.8e-26.el5_9.4.x86_64.rpm     MD5: 4c9eb6b24c5db216c48f9ef5540b7dcaSHA-256: a8814431614f2d8356d199e14cc84615936b1ab206ceed2d43c90f7775495d44 openssl-debuginfo-0.9.8e-26.el5_9.4.i386.rpm     MD5: 6a06635d007a39bf3e2ca7d8dd237471SHA-256: 59a5422b46a7900e2960985fc37de505aa8f3ab28f19f82427723bf03d26bf24 openssl-debuginfo-0.9.8e-26.el5_9.4.i686.rpm     MD5: 83bab61f09ff15d3b38ef3f7d45dbbaeSHA-256: 2d459537da138f3a5404d34105104c4c1957b36b780b1fbcb7786864830be89c openssl-debuginfo-0.9.8e-26.el5_9.4.x86_64.rpm     MD5: 5ac27eb9bdea6f7501b4d794571acca6SHA-256: d31c7aa08d1d4d39aa7d691ae2904bce4b0beccce0c23b634a01c421ce429488 openssl-devel-0.9.8e-26.el5_9.4.i386.rpm     MD5: ccbe59538439a8d2bbc6797f3fd72d6dSHA-256: 238c6a419e8be6768204d5527fdf0e591722a6581ef51bc8f6ac917d60415be5 openssl-devel-0.9.8e-26.el5_9.4.x86_64.rpm     MD5: c7d3bec0d7ff105314a12c5a5be29e8fSHA-256: 9cb74c050f8b7509d005bff73182c3cf76feff56bdffd6c5bcc47ed0dbfbcf2b openssl-perl-0.9.8e-26.el5_9.4.x86_64.rpm     MD5: d5069c1f38a24f7450a86efbfc16c589SHA-256: f327a0d8bd96f74b0aeb4274cf53251135588394d5be162b04147b5423aa3ac7   Red Hat Enterprise Linux Long Life (v. 5.6 server) SRPMS: openssl-0.9.8e-12.el5_6.12.src.rpm     MD5: 8186016da3c825714e1d8763e85a2bffSHA-256: 9d934ff4e1a26cbe617791edd91aeb5beaa510d356912f4463d9558bf9b23095   IA-32: openssl-0.9.8e-12.el5_6.12.i386.rpm     MD5: 46ad2a85dfdbf2fc46cef83591d0d846SHA-256: 14f744ad6f7309770cc4b4543a9438329cb42e4a59aa67d5261cb1c49bd728c2 openssl-0.9.8e-12.el5_6.12.i686.rpm     MD5: 66c87112d918225092032c8e3e35f279SHA-256: a3601888ab5fd5b6c6d0bbd97bcdbf4a1fd060504f2a4e750a3f850a44e0e811 openssl-debuginfo-0.9.8e-12.el5_6.12.i386.rpm     MD5: 0ae0504d55116bfb45de89b2dcec0e4cSHA-256: 5a07ea57caf28ee10184a91b3000d586b7881cf567db0db223511e2a765ffef4 openssl-debuginfo-0.9.8e-12.el5_6.12.i686.rpm     MD5: 1007c868f5c6a2a5ffb85d8d08def870SHA-256: eb2e16c1f52ea26255ec356a05d9758836342570ae10141d19ddf7b36fe4204f openssl-devel-0.9.8e-12.el5_6.12.i386.rpm     MD5: dda73af3a8ede8345b4a6e4179d08f05SHA-256: d40de31ea4b66489f6a0e82a6fa7c8e72313e78de85ba59c2f0fff4201f0afbf openssl-perl-0.9.8e-12.el5_6.12.i386.rpm     MD5: 060e7f0cde0fce7d61b96abf0b9698f1SHA-256: 863880c6a1c62bca4b7a23b6bdf5547a7c15e513f0a547d7c20362c4ed9ecb65   IA-64: openssl-0.9.8e-12.el5_6.12.i686.rpm     MD5: 66c87112d918225092032c8e3e35f279SHA-256: a3601888ab5fd5b6c6d0bbd97bcdbf4a1fd060504f2a4e750a3f850a44e0e811 openssl-0.9.8e-12.el5_6.12.ia64.rpm     MD5: 473c25bdba731262658652ccb17607c8SHA-256: 029a8600ddb26b0a000c83f5a37e6033d7574eaabdab209977e5218bf83d3ab9 openssl-debuginfo-0.9.8e-12.el5_6.12.i686.rpm     MD5: 1007c868f5c6a2a5ffb85d8d08def870SHA-256: eb2e16c1f52ea26255ec356a05d9758836342570ae10141d19ddf7b36fe4204f openssl-debuginfo-0.9.8e-12.el5_6.12.ia64.rpm     MD5: aba1dc84c19da04b0d11025fb6fd4dddSHA-256: eb3fe9e2b9c0b0a69065cf33bbd717de45ed99fc45697185ca53cc44f1b11838 openssl-devel-0.9.8e-12.el5_6.12.ia64.rpm     MD5: 4d3d40fe0b8cdca110117d4d252c6c99SHA-256: 38524ed521f29ffa0596c2d7dce7191f1d82b21b87de6ebd1c34654d08d2add6 openssl-perl-0.9.8e-12.el5_6.12.ia64.rpm     MD5: b4ce0d145c1ab98b01344e1186340391SHA-256: e53d900894bac33442c835e7c1dc8e340a12b98cbed8cf5e14c8383c82ce85d2   x86_64: openssl-0.9.8e-12.el5_6.12.i686.rpm     MD5: 66c87112d918225092032c8e3e35f279SHA-256: a3601888ab5fd5b6c6d0bbd97bcdbf4a1fd060504f2a4e750a3f850a44e0e811 openssl-0.9.8e-12.el5_6.12.x86_64.rpm     MD5: fb75e518cdcddaf9a5d0d59339209c1aSHA-256: 99178bd5c8dfaa3c3bd5b9994ef70f5bab913cbb073a8f4d497caada3d0366ce openssl-debuginfo-0.9.8e-12.el5_6.12.i386.rpm     MD5: 0ae0504d55116bfb45de89b2dcec0e4cSHA-256: 5a07ea57caf28ee10184a91b3000d586b7881cf567db0db223511e2a765ffef4 openssl-debuginfo-0.9.8e-12.el5_6.12.i686.rpm     MD5: 1007c868f5c6a2a5ffb85d8d08def870SHA-256: eb2e16c1f52ea26255ec356a05d9758836342570ae10141d19ddf7b36fe4204f openssl-debuginfo-0.9.8e-12.el5_6.12.x86_64.rpm     MD5: 630061f264250904a5ae81b72e831a1eSHA-256: cf3064598ac1808756b9e9a20a0a8a5e543e8792f0934f49640a9c159c20c7df openssl-devel-0.9.8e-12.el5_6.12.i386.rpm     MD5: dda73af3a8ede8345b4a6e4179d08f05SHA-256: d40de31ea4b66489f6a0e82a6fa7c8e72313e78de85ba59c2f0fff4201f0afbf openssl-devel-0.9.8e-12.el5_6.12.x86_64.rpm     MD5: cc97acd13d66f98a2c71d886c977d95bSHA-256: e7bdb053ea8ee188ef3939afc4ab0082c2ab8ea0097a9d2bd078f3facc3b8add openssl-perl-0.9.8e-12.el5_6.12.x86_64.rpm     MD5: 8bef660cd13942449cebcc124fe12859SHA-256: dd6ebf61422be0d30965b20f97503eb16ad47d4d5cbc4c7be26c462019791cbc   Red Hat Enterprise Linux Long Life (v. 5.9 server) SRPMS: openssl-0.9.8e-26.el5_9.4.src.rpm     MD5: c192647e844cd6568580f9b0efac330fSHA-256: 7894cf1b7ee880433afbf147b532bdee488ee18477275ba9dd20df8ec90cbbb1   IA-32: openssl-0.9.8e-26.el5_9.4.i386.rpm     MD5: 066fa7c6a5e45d13ebd0b21f3ce0f5a3SHA-256: 9ed34f5722ea42f4ea054e75e05b6df8602fc0f8d72422289861370fb82c5e77 openssl-0.9.8e-26.el5_9.4.i686.rpm     MD5: 971a1686558768ab4f3d742064179625SHA-256: cdc7d1e1408cb5616ced42247bb70e40ec5f8b98667420f15fa04349607eb334 openssl-debuginfo-0.9.8e-26.el5_9.4.i386.rpm     MD5: 6a06635d007a39bf3e2ca7d8dd237471SHA-256: 59a5422b46a7900e2960985fc37de505aa8f3ab28f19f82427723bf03d26bf24 openssl-debuginfo-0.9.8e-26.el5_9.4.i686.rpm     MD5: 83bab61f09ff15d3b38ef3f7d45dbbaeSHA-256: 2d459537da138f3a5404d34105104c4c1957b36b780b1fbcb7786864830be89c openssl-devel-0.9.8e-26.el5_9.4.i386.rpm     MD5: ccbe59538439a8d2bbc6797f3fd72d6dSHA-256: 238c6a419e8be6768204d5527fdf0e591722a6581ef51bc8f6ac917d60415be5 openssl-perl-0.9.8e-26.el5_9.4.i386.rpm     MD5: 062ff7cc47f7802c785847c7758b1cfaSHA-256: cb7e3752892d116c54d77eadf5c56c94bb06f7aa3be235f6759f09182d718236   IA-64: openssl-0.9.8e-26.el5_9.4.i686.rpm     MD5: 971a1686558768ab4f3d742064179625SHA-256: cdc7d1e1408cb5616ced42247bb70e40ec5f8b98667420f15fa04349607eb334 openssl-0.9.8e-26.el5_9.4.ia64.rpm     MD5: 0b9197b3d685a2df84916689d9eaedbaSHA-256: a91999ee0050688b5a9e57d1a9771d5496c38a658b02acc66fabc6548d8898b1 openssl-debuginfo-0.9.8e-26.el5_9.4.i686.rpm     MD5: 83bab61f09ff15d3b38ef3f7d45dbbaeSHA-256: 2d459537da138f3a5404d34105104c4c1957b36b780b1fbcb7786864830be89c openssl-debuginfo-0.9.8e-26.el5_9.4.ia64.rpm     MD5: 19c7daa2f1997d99a8caef666fe8e3b1SHA-256: 8325dbf3a0ac8b1d6e7e8d00fd0de840dc46065314e0678476e180a4413bf05d openssl-devel-0.9.8e-26.el5_9.4.ia64.rpm     MD5: 4e0bccd1bf67b9f90be2dda1f01176d3SHA-256: a8a6f8ce8b6efbece19cfdf7c40198a76e8fa98b398b402588233f93149cd4ed openssl-perl-0.9.8e-26.el5_9.4.ia64.rpm     MD5: 895184ab41bb17ed91336ff90a27cd70SHA-256: 69528632d2cdeae148c09e3289d4e5842e9d00f0643aaeb588a9ed422e392d5c   x86_64: openssl-0.9.8e-26.el5_9.4.i686.rpm     MD5: 971a1686558768ab4f3d742064179625SHA-256: cdc7d1e1408cb5616ced42247bb70e40ec5f8b98667420f15fa04349607eb334 openssl-0.9.8e-26.el5_9.4.x86_64.rpm     MD5: 4c9eb6b24c5db216c48f9ef5540b7dcaSHA-256: a8814431614f2d8356d199e14cc84615936b1ab206ceed2d43c90f7775495d44 openssl-debuginfo-0.9.8e-26.el5_9.4.i386.rpm     MD5: 6a06635d007a39bf3e2ca7d8dd237471SHA-256: 59a5422b46a7900e2960985fc37de505aa8f3ab28f19f82427723bf03d26bf24 openssl-debuginfo-0.9.8e-26.el5_9.4.i686.rpm     MD5: 83bab61f09ff15d3b38ef3f7d45dbbaeSHA-256: 2d459537da138f3a5404d34105104c4c1957b36b780b1fbcb7786864830be89c openssl-debuginfo-0.9.8e-26.el5_9.4.x86_64.rpm     MD5: 5ac27eb9bdea6f7501b4d794571acca6SHA-256: d31c7aa08d1d4d39aa7d691ae2904bce4b0beccce0c23b634a01c421ce429488 openssl-devel-0.9.8e-26.el5_9.4.i386.rpm     MD5: ccbe59538439a8d2bbc6797f3fd72d6dSHA-256: 238c6a419e8be6768204d5527fdf0e591722a6581ef51bc8f6ac917d60415be5 openssl-devel-0.9.8e-26.el5_9.4.x86_64.rpm     MD5: c7d3bec0d7ff105314a12c5a5be29e8fSHA-256: 9cb74c050f8b7509d005bff73182c3cf76feff56bdffd6c5bcc47ed0dbfbcf2b openssl-perl-0.9.8e-26.el5_9.4.x86_64.rpm     MD5: d5069c1f38a24f7450a86efbfc16c589SHA-256: f327a0d8bd96f74b0aeb4274cf53251135588394d5be162b04147b5423aa3ac7   Red Hat Enterprise Linux Server AUS (v. 6.2) SRPMS: openssl-1.0.0-20.el6_2.7.src.rpm     MD5: 51fd0069ef47db0533bdf4ad1981172cSHA-256: 8e48cfdc5d6dee447bf39af3b618bd4bb9cfd3efc8f858cf53b80147d4d65ef8   x86_64: openssl-1.0.0-20.el6_2.7.i686.rpm     MD5: baf87bdbb6aafc37002ec3cbc0467c60SHA-256: d1e9f688ccdfeb1fec1810a169504a26c4692ec011130fbdd3f64389f38ca99c openssl-1.0.0-20.el6_2.7.x86_64.rpm     MD5: 3b41b95d0969aba9d0a25caa2ace516cSHA-256: 06251116b90e9972e7aec8add4922482c344aa1e0cf037e4d4abc42e2f54b48d openssl-debuginfo-1.0.0-20.el6_2.7.i686.rpm     MD5: 5a87f716f11a4f1dd22f31ab403bfaf2SHA-256: fed4f39adbf23268afed4ab9f83db18771c017c20db0d8a9b4da8cce1eae07f5 openssl-debuginfo-1.0.0-20.el6_2.7.x86_64.rpm     MD5: 0a2af3aa2d25ebdba1f7523cfe38aea8SHA-256: 82bae1e7d79c13f1f34e99529efa08edbc9830048d808e0ae549811bdafc5a58 openssl-devel-1.0.0-20.el6_2.7.i686.rpm     MD5: ce7cdb08734edf789dc26ede47aabeddSHA-256: 1d4cc9a9c40dd6eed9b6742c53ecd251b71ffd8d11c0ec13235c1a1ae12b17f9 openssl-devel-1.0.0-20.el6_2.7.x86_64.rpm     MD5: 78bcc4b2cc25bce6bb294c509ef99932SHA-256: 6ec1ca1256462c754ea6d84fd9f02ef08ddbf30b020f57e1c0682fd360d5319b openssl-perl-1.0.0-20.el6_2.7.x86_64.rpm     MD5: 46967222403ba2645595306543f71f13SHA-256: 1184604633478a1f0299d03c0133ac2e4376a22e93b96183b259f2758eddf756 openssl-static-1.0.0-20.el6_2.7.x86_64.rpm     MD5: b2e0a4fe4b1538e7df2049fc705460dcSHA-256: 5187328409bd7f877ded37c27673647394a11415bf0cf2468dedca83d723cb87   Red Hat Enterprise Linux Server AUS (v. 6.4) SRPMS: openssl-1.0.0-27.el6_4.4.src.rpm     MD5: 61fca093d91d78f58d0167cdea1ff986SHA-256: 80db822460fd4090d9be49f478c695c7e632070046c5b15cb201efb65dfcc758   x86_64: openssl-1.0.0-27.el6_4.4.i686.rpm     MD5: 48ea4731c635100b122ea9fac93f9cddSHA-256: 0afb02b326a15ab3d23e47f84bf491af620bb41b8eba331def0acaa9a0115d04 openssl-1.0.0-27.el6_4.4.x86_64.rpm     MD5: 9fff3a3394ca908eaf7ae2c0a67169caSHA-256: 59922f63f5e267dc259fab6316c7655de92dca5c5de5f1aeac672d3b13e12b82 openssl-debuginfo-1.0.0-27.el6_4.4.i686.rpm     MD5: e58cb39838a4f3bac020167c81f5ffe3SHA-256: 9c323a035e5ce39f2fe217a9d449dab395355829a6010ef0240a13b773a3cfc5 openssl-debuginfo-1.0.0-27.el6_4.4.x86_64.rpm     MD5: de1e31c6e27b7f3f6b64cd34c045f4daSHA-256: a03d9778ffd7c86ecb8c7691c1190eb1b1758f263116eed68f009a28afe7b9f5 openssl-devel-1.0.0-27.el6_4.4.i686.rpm     MD5: 57e83d040b3c3f8a073b64731281d1f5SHA-256: e11d91d6a943ed9a72337d298948cda2fd0dcab118fd1f3e57010bb862a9ae77 openssl-devel-1.0.0-27.el6_4.4.x86_64.rpm     MD5: 47dc101ea2313a3836e694bfda2994daSHA-256: 3cb4aa653974a86503de6c40295b4a9fe5aac0fa9df981f90f6c23a468aa5471 openssl-perl-1.0.0-27.el6_4.4.x86_64.rpm     MD5: a4e0f857bd5847e596bbe15ab365d65cSHA-256: 1a52f4143e51d9017570cf6c105fc777a4479b433e23b31848465b00bec1bde4 openssl-static-1.0.0-27.el6_4.4.x86_64.rpm     MD5: 1b43fca45d70ff90cbd98992b8180399SHA-256: d3c40252e0c0d26ce689eb19f920d3c90a85fd138675f13d789c67db248b8462   Red Hat Enterprise Linux Server EUS (v. 6.3.z) SRPMS: openssl-1.0.0-25.el6_3.3.src.rpm     MD5: 1fcf0c64146107414964db4c3d1d8fefSHA-256: 59cd24ee0fffe515fe1fcc38a905c32b8d22be323c162c81f21f05a9c9900a41   IA-32: openssl-1.0.0-25.el6_3.3.i686.rpm     MD5: 8c608c9562eefa636fa9f8f45f4d52eaSHA-256: b74b789baae9d25075ae1f8298cb06756becdb64d6746489af535a724c3d6c32 openssl-debuginfo-1.0.0-25.el6_3.3.i686.rpm     MD5: 676187d219434457314c0a693b94dfaaSHA-256: 9e9bf5524e635f2a0fcd958a9ba07654b9b8a909e00a120d955325bd8eaea21f openssl-devel-1.0.0-25.el6_3.3.i686.rpm     MD5: 00d689645063a41b9d0a29830ede6f6dSHA-256: 41d2f10916977024fc74a250c18f9b412f1fc5c2afd4b302b973846b6cf1d9c3 openssl-perl-1.0.0-25.el6_3.3.i686.rpm     MD5: 42c750ac261ef9ad0541e98e663d80d4SHA-256: 2f0457a2e78f42b252731bc676a3183e279d50f5e4c055cbc79de3e4f1d08a78 openssl-static-1.0.0-25.el6_3.3.i686.rpm     MD5: 735f0185d53a36633bf69d729e685287SHA-256: e4296d78ae4f84d168a4959deb7b806e73882adbacdca5605b1a0f5cda982332   PPC: openssl-1.0.0-25.el6_3.3.ppc.rpm     MD5: f9c1a7ef13ef3ce4f77e392512386edfSHA-256: ae0dca33a12bd5704e8808b100deff11b55f11619ba23b0438f4c3c7279c1abd openssl-1.0.0-25.el6_3.3.ppc64.rpm     MD5: e2ec4355dfa7c2ad5aa2e5d3313efe49SHA-256: 0d20e5530872b69001a20280bc665cc69c646833b49a6ee2dd157af2c1e66cba openssl-debuginfo-1.0.0-25.el6_3.3.ppc.rpm     MD5: 73bf254e1a370dbc1bcf796215905385SHA-256: edf1229187ab281bb4d4c704487d15d3d3d67a319ac5d341740068eddb03b638 openssl-debuginfo-1.0.0-25.el6_3.3.ppc64.rpm     MD5: 8efc5bf21b272794f67163a239e3ec77SHA-256: 8be9520bf93e7a78c1b57e27e41e9e867c8129fe18ecab3a9f084564e9f0c672 openssl-devel-1.0.0-25.el6_3.3.ppc.rpm     MD5: 433bdfe7e6e9f08610a9a34d2a7810e1SHA-256: e05ac7075eaa3661fb964c2bf972120ec35e27660b1193b4b8fbf382897ad61e openssl-devel-1.0.0-25.el6_3.3.ppc64.rpm     MD5: 69d3cb555590d7a0de9a7d9c3c93aa01SHA-256: da6f7ab051ee729868444114267d591fe04e2e4f907279eda58fa8fe4f00b133 openssl-perl-1.0.0-25.el6_3.3.ppc64.rpm     MD5: d8429c8707bb16c3bb8e373b55a96753SHA-256: fcd60f29afb8643413b19bb3012dda716470a3f64cbda74a548871b7121d2b62 openssl-static-1.0.0-25.el6_3.3.ppc64.rpm     MD5: 2f0ddf4516dccd3cc714e81f24e59ed3SHA-256: f5ca27b5f3e50158608b4726a0f0820a076043f2834d825eb0da20ba4e6e6f87   s390x: openssl-1.0.0-25.el6_3.3.s390.rpm     MD5: 130077ea8698efd247456d32dda4987aSHA-256: 683f89ff435cd629b55584aa165075b95be1737c6aead876e3e7f6934f8fc122 openssl-1.0.0-25.el6_3.3.s390x.rpm     MD5: 68f265e398381d86f6971a50714fd774SHA-256: 0cae6904d3d3cf6119d082753455ebb062704f5ee2238550ebe0af5eebcffe27 openssl-debuginfo-1.0.0-25.el6_3.3.s390.rpm     MD5: a4ae1338016e9d809a2a5f3921eb1c97SHA-256: e59922fd5916a97df12767261da08eacfca7b3edd71ac9fa4f5f98db104d1ced openssl-debuginfo-1.0.0-25.el6_3.3.s390x.rpm     MD5: f08467a9e41b41e8800078f4653476fcSHA-256: 9793a4a5e2667e006cfd033484672a6ad4a4ee298af415ded06dd8e28dc95574 openssl-devel-1.0.0-25.el6_3.3.s390.rpm     MD5: 528cc0182477d5045684be200697833cSHA-256: 7f680530ae67319532c6704dd15623b9cfbd3a39f39cb2c7a6641a77a10a6861 openssl-devel-1.0.0-25.el6_3.3.s390x.rpm     MD5: 676c8a6ec2f2cc53acdf879a9178ec20SHA-256: df7f6510d7e86c90c5c220a7c5091ff9e9e18ecbe462442a8d9b7231d3d7d0a7 openssl-perl-1.0.0-25.el6_3.3.s390x.rpm     MD5: b13f31ce5656fd72277153471513180cSHA-256: bb1e30a7a9930237df22a654f9d558eddfe9e71ab0562c0f1abdb0ad72d442e9 openssl-static-1.0.0-25.el6_3.3.s390x.rpm     MD5: ad4de8a678f609784f207e706e587e09SHA-256: ac455efca6280f998ee2954a7c3d095a8b076797f48d4b1ea85e9f4f74dd103f   x86_64: openssl-1.0.0-25.el6_3.3.i686.rpm     MD5: 8c608c9562eefa636fa9f8f45f4d52eaSHA-256: b74b789baae9d25075ae1f8298cb06756becdb64d6746489af535a724c3d6c32 openssl-1.0.0-25.el6_3.3.x86_64.rpm     MD5: 7eac12affd8e0facdfda4e6f3e7e7a9fSHA-256: 431b04c4a08000ba770a26bafc3f663f99eaff1fdd29a8463f7ffbf55f17b098 openssl-debuginfo-1.0.0-25.el6_3.3.i686.rpm     MD5: 676187d219434457314c0a693b94dfaaSHA-256: 9e9bf5524e635f2a0fcd958a9ba07654b9b8a909e00a120d955325bd8eaea21f openssl-debuginfo-1.0.0-25.el6_3.3.x86_64.rpm     MD5: 255d66b49ae605f82ba12f3cc7e754a2SHA-256: ed6fc78991ea63405ad16c7491600f782347c2c39c0a72df950a8bf5c1f4f663 openssl-devel-1.0.0-25.el6_3.3.i686.rpm     MD5: 00d689645063a41b9d0a29830ede6f6dSHA-256: 41d2f10916977024fc74a250c18f9b412f1fc5c2afd4b302b973846b6cf1d9c3 openssl-devel-1.0.0-25.el6_3.3.x86_64.rpm     MD5: 231097118484c9ef8d633f29d7662bfdSHA-256: 5736c7c89f6216693d47a7e9a1a1a7290fd54a89d8f96734ca14a272fbd2a233 openssl-perl-1.0.0-25.el6_3.3.x86_64.rpm     MD5: 4fd6e3d74a8565776790b0fe023db2caSHA-256: 009c24358291ef669d72c5f0e559b25150e83010bed768f9eac1fb86fea764f9 openssl-static-1.0.0-25.el6_3.3.x86_64.rpm     MD5: d0836f59b810527a01fcf5b18c50727dSHA-256: 43b9ef9c8a89851ca1a851819a8dd455904328750b64d298fa6934ee138935ea   Red Hat Enterprise Linux Server EUS (v. 6.4.z) SRPMS: openssl-1.0.0-27.el6_4.4.src.rpm     MD5: 61fca093d91d78f58d0167cdea1ff986SHA-256: 80db822460fd4090d9be49f478c695c7e632070046c5b15cb201efb65dfcc758   IA-32: openssl-1.0.0-27.el6_4.4.i686.rpm     MD5: 48ea4731c635100b122ea9fac93f9cddSHA-256: 0afb02b326a15ab3d23e47f84bf491af620bb41b8eba331def0acaa9a0115d04 openssl-debuginfo-1.0.0-27.el6_4.4.i686.rpm     MD5: e58cb39838a4f3bac020167c81f5ffe3SHA-256: 9c323a035e5ce39f2fe217a9d449dab395355829a6010ef0240a13b773a3cfc5 openssl-devel-1.0.0-27.el6_4.4.i686.rpm     MD5: 57e83d040b3c3f8a073b64731281d1f5SHA-256: e11d91d6a943ed9a72337d298948cda2fd0dcab118fd1f3e57010bb862a9ae77 openssl-perl-1.0.0-27.el6_4.4.i686.rpm     MD5: b860401730de7aae37df4d15b8066fa5SHA-256: 2a2c2c2f5497f80caecd741745543189b0a97ba5acd098f7860ed13b443516e3 openssl-static-1.0.0-27.el6_4.4.i686.rpm     MD5: 847750f988254a4f4431017c358f8e95SHA-256: e1a0d3b0cbab4f31aa5328ab6f5cbba5be4b9bafa50e8a730abd4b67639c9aa1   PPC: openssl-1.0.0-27.el6_4.4.ppc.rpm     MD5: 511a4d1836847c5217d5c068f84ee8f6SHA-256: 6f0d61676f507bb07bdbc79e49d0fb9dd4e016afa21b6c60b8c1ba5383fbebce openssl-1.0.0-27.el6_4.4.ppc64.rpm     MD5: c67558d24415b639e6e24f92b094480bSHA-256: 050d7882539b4dffd807651f8db00b88bd7f7df6e8beb93ace519b1d0aecab49 openssl-debuginfo-1.0.0-27.el6_4.4.ppc.rpm     MD5: f418dad753c5ec8da150945019108ad8SHA-256: c68b105eaec1a860276fabd56c8d229d417825197852276d72239e1f83228c84 openssl-debuginfo-1.0.0-27.el6_4.4.ppc64.rpm     MD5: 58f5e977011a9d9119269eedf6874654SHA-256: 9be44b70952644406fe09f8b2ab3f72784fd7103c7920d5e7f1dc55d2c3bb2ac openssl-devel-1.0.0-27.el6_4.4.ppc.rpm     MD5: b6e38ba90c19d362cf12bc1ed40fe313SHA-256: 8949230f7021c71627e5a27e7f1e28808ac3419b18c01dd135a170fa5fb42dd3 openssl-devel-1.0.0-27.el6_4.4.ppc64.rpm     MD5: a79e4cc4d558e63a954de60f6b3051e9SHA-256: 4684d4aaaddebd83692e3b7e639c3c52d2580b3d17f19d331d92f424edf86379 openssl-perl-1.0.0-27.el6_4.4.ppc64.rpm     MD5: ed147c4613395a08047f64e9dd5fbb9dSHA-256: 0741104f677f88f3dd73495043f3829bd5dccaa1b9161a69bf4c9da1a23874df openssl-static-1.0.0-27.el6_4.4.ppc64.rpm     MD5: e65975d908f0a32ec7ca1fdcacf5ad7bSHA-256: ba20aeb7140776381dcae23cbd92665b1d24dc4d3972dfdd47edabd15065ac39   s390x: openssl-1.0.0-27.el6_4.4.s390.rpm     MD5: 99516716bc36b7e0a5bdaf04bfe37825SHA-256: 26a5fa81dcbe47d5f9bf9e40c386c241c90b7d53eced85fe8be60b8566a127b7 openssl-1.0.0-27.el6_4.4.s390x.rpm     MD5: cc478f8f3123b72464937d06d831111aSHA-256: 9a67d4e40d494ff52cd1ac558584db82be1afa337ea5e2f2bb58a88fc5735948 openssl-debuginfo-1.0.0-27.el6_4.4.s390.rpm     MD5: c63835062ee5bcf6b329f9e219549867SHA-256: d4a0de3606e946ca1188da9334e4e91a0af4f743ddbdd629a74415cd0373bcc1 openssl-debuginfo-1.0.0-27.el6_4.4.s390x.rpm     MD5: 78bb725622f4afd5f6767e331b350897SHA-256: 77f4304a1d9a573ee4fe1307d178b308077be4bbcce9c820717a65885d4fb5b7 openssl-devel-1.0.0-27.el6_4.4.s390.rpm     MD5: e376d9dd273b32922afd59df84872b9dSHA-256: 6c3867833f913f326aa3479f60cad33962cdf33085c43125fd09ccdaa8fe72bf openssl-devel-1.0.0-27.el6_4.4.s390x.rpm     MD5: 238d5be5e5fded653c5d5d278fa21688SHA-256: d5355bca91edd9f2c7b8e3234867cd277976678afde3c7738911f12dbe4a9330 openssl-perl-1.0.0-27.el6_4.4.s390x.rpm     MD5: 8a9531dd5ccb2f845d78a660bd9f35efSHA-256: 3aeff6b150ebd09afdb92a38b79a2b165885cc91e905e973684b410b3680d901 openssl-static-1.0.0-27.el6_4.4.s390x.rpm     MD5: e9e94a1605db739373b6db1ff97cfeffSHA-256: 906ceb5d7070a711ef7842b6f827c7300f4405dc9483e3479071bb011e370b32   x86_64: openssl-1.0.0-27.el6_4.4.i686.rpm     MD5: 48ea4731c635100b122ea9fac93f9cddSHA-256: 0afb02b326a15ab3d23e47f84bf491af620bb41b8eba331def0acaa9a0115d04 openssl-1.0.0-27.el6_4.4.x86_64.rpm     MD5: 9fff3a3394ca908eaf7ae2c0a67169caSHA-256: 59922f63f5e267dc259fab6316c7655de92dca5c5de5f1aeac672d3b13e12b82 openssl-debuginfo-1.0.0-27.el6_4.4.i686.rpm     MD5: e58cb39838a4f3bac020167c81f5ffe3SHA-256: 9c323a035e5ce39f2fe217a9d449dab395355829a6010ef0240a13b773a3cfc5 openssl-debuginfo-1.0.0-27.el6_4.4.x86_64.rpm     MD5: de1e31c6e27b7f3f6b64cd34c045f4daSHA-256: a03d9778ffd7c86ecb8c7691c1190eb1b1758f263116eed68f009a28afe7b9f5 openssl-devel-1.0.0-27.el6_4.4.i686.rpm     MD5: 57e83d040b3c3f8a073b64731281d1f5SHA-256: e11d91d6a943ed9a72337d298948cda2fd0dcab118fd1f3e57010bb862a9ae77 openssl-devel-1.0.0-27.el6_4.4.x86_64.rpm     MD5: 47dc101ea2313a3836e694bfda2994daSHA-256: 3cb4aa653974a86503de6c40295b4a9fe5aac0fa9df981f90f6c23a468aa5471 openssl-perl-1.0.0-27.el6_4.4.x86_64.rpm     MD5: a4e0f857bd5847e596bbe15ab365d65cSHA-256: 1a52f4143e51d9017570cf6c105fc777a4479b433e23b31848465b00bec1bde4 openssl-static-1.0.0-27.el6_4.4.x86_64.rpm     MD5: 1b43fca45d70ff90cbd98992b8180399SHA-256: d3c40252e0c0d26ce689eb19f920d3c90a85fd138675f13d789c67db248b8462   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2014:0626-1: Important: openssl097a and openssl098e security update

Updated openssl097a and openssl098e packages that fix one security issueare now available for Red Hat Enterprise Linux 5 and 6 respectively.The Red Hat Security Response Team has rated this update as havingImportant security impact. A Common Vulnerability Scoring System (CVSS)base score, which gives a detailed severity rating, is available from theCVE link in the References section. OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)and Transport Layer Security (TLS v1) protocols, as well as afull-strength, general purpose cryptography library.It was found that OpenSSL clients and servers could be forced, via aspecially crafted handshake packet, to use weak keying material forcommunication. A man-in-the-middle attacker could use this flaw to decryptand modify traffic between a client and a server. (CVE-2014-0224)Note: In order to exploit this flaw, both the server and the client must beusing a vulnerable version of OpenSSL; the server must be using OpenSSLversion 1.0.1 and above, and the client must be using any version ofOpenSSL. For more information about this flaw, refer to:https://access.redhat.com/site/articles/904433Red Hat would like to thank the OpenSSL project for reporting this issue.Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporterof this issue.All OpenSSL users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. For the update to takeeffect, all services linked to the OpenSSL library (such as httpd and otherSSL-enabled services) must be restarted or the system rebooted. Red Hat Enterprise Linux (v. 5 server) SRPMS: openssl097a-0.9.7a-12.el5_10.1.src.rpm     MD5: 19af3e117e7b6465e17dfd3bfdd93022SHA-256: 80b8e81e522b41857637c1092f40b49cab068a91d4d9ee86baddf0201873bd90   IA-32: openssl097a-0.9.7a-12.el5_10.1.i386.rpm     MD5: 63a204f2d68437dc54a83f92424011d1SHA-256: 8bd83b5fea5df3b03379011ee7316b1561565d98436c53febd2c2ee3c54a900f openssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm     MD5: c3b2dcb01c6325453c8a533a615fd760SHA-256: a5e84e61162b71f0f9544161ce5d9b6c1afb1adfc339385f3a2c7be35574d822   IA-64: openssl097a-0.9.7a-12.el5_10.1.i386.rpm     MD5: 63a204f2d68437dc54a83f92424011d1SHA-256: 8bd83b5fea5df3b03379011ee7316b1561565d98436c53febd2c2ee3c54a900f openssl097a-0.9.7a-12.el5_10.1.ia64.rpm     MD5: a87fc18c19c05bc5cb8b6b67a784c99dSHA-256: e3cec84513e0beec9b68e1686fc9842bad08bef8cd863ad9a33ba9c26ded6dda openssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm     MD5: c3b2dcb01c6325453c8a533a615fd760SHA-256: a5e84e61162b71f0f9544161ce5d9b6c1afb1adfc339385f3a2c7be35574d822 openssl097a-debuginfo-0.9.7a-12.el5_10.1.ia64.rpm     MD5: 091b7c34b464163b76b245c9e22b4ad8SHA-256: ad8734a539ae16cbb0f19e40a2a1084dfc27604c9b075541aaf582a9ff921003   PPC: openssl097a-0.9.7a-12.el5_10.1.ppc.rpm     MD5: ff0a1cb4dbe95e6b261760759a819943SHA-256: 4ac0da6bc862a057dfb69a00846dbc340fb3a03e6bcca7abb33b31cb0321e991 openssl097a-0.9.7a-12.el5_10.1.ppc64.rpm     MD5: 6b6a25f21e3c27e2cfb182308af80085SHA-256: 65f121b4c3231356ea328d84407b6515c7bf61d26c5c72f6cf05a2ccb2c67c0d openssl097a-debuginfo-0.9.7a-12.el5_10.1.ppc.rpm     MD5: 86833938b8a71f8f1dfcd84d64bc516aSHA-256: 85be513ad9c8b92dfe18a9ccd3bf6ac9ad736fa20a089ec6ba0bf8e4d53d9372 openssl097a-debuginfo-0.9.7a-12.el5_10.1.ppc64.rpm     MD5: d6f790a6ad0094d06a03f94e083604f8SHA-256: 62d21dab7fc4b09d2972651dd8bc0c2e9dce5d14a4a0299282319b3474e46fb6   s390x: openssl097a-0.9.7a-12.el5_10.1.s390.rpm     MD5: 9d4a4a7e5fb3845b6ec1d5b1354a0b65SHA-256: 2b32b23986995f5db6901cd07fa9b3c237bec5a3ffee4a2c2a82261a2a2cd253 openssl097a-0.9.7a-12.el5_10.1.s390x.rpm     MD5: 377c1c434385b42e9e793f473f11bcd5SHA-256: b2e241d2663eb509e9503200c7afa07f648b53a24708e24556976c3d0a3e0b96 openssl097a-debuginfo-0.9.7a-12.el5_10.1.s390.rpm     MD5: a3289cb120062926706a46cc356a2255SHA-256: 79b963aaedaa9d87ac2d8fe72e088f8e31db11ca3da6b5dea025143056414822 openssl097a-debuginfo-0.9.7a-12.el5_10.1.s390x.rpm     MD5: 0f3a940e89ba85f6f686c32d4dd996beSHA-256: 8cd830d6543f2e05d390a55d38f275f15cc7d4fc11d679a96d5ba6d835151b40   x86_64: openssl097a-0.9.7a-12.el5_10.1.i386.rpm     MD5: 63a204f2d68437dc54a83f92424011d1SHA-256: 8bd83b5fea5df3b03379011ee7316b1561565d98436c53febd2c2ee3c54a900f openssl097a-0.9.7a-12.el5_10.1.x86_64.rpm     MD5: 4a56c28ff8afbb29a33cf359eb1263b8SHA-256: ca3201e4f9ffd08df6cc65d1e1a4ffd9146c7e7e2e9d759e10316469be298138 openssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm     MD5: c3b2dcb01c6325453c8a533a615fd760SHA-256: a5e84e61162b71f0f9544161ce5d9b6c1afb1adfc339385f3a2c7be35574d822 openssl097a-debuginfo-0.9.7a-12.el5_10.1.x86_64.rpm     MD5: 14c2b09c32908907b517a9a7cee7fa1fSHA-256: c544472a22c211092cff19159bf86fa5f57a4bc70fa9c9cac94e88916e04e317   Red Hat Enterprise Linux Desktop (v. 5 client) SRPMS: openssl097a-0.9.7a-12.el5_10.1.src.rpm     MD5: 19af3e117e7b6465e17dfd3bfdd93022SHA-256: 80b8e81e522b41857637c1092f40b49cab068a91d4d9ee86baddf0201873bd90   IA-32: openssl097a-0.9.7a-12.el5_10.1.i386.rpm     MD5: 63a204f2d68437dc54a83f92424011d1SHA-256: 8bd83b5fea5df3b03379011ee7316b1561565d98436c53febd2c2ee3c54a900f openssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm     MD5: c3b2dcb01c6325453c8a533a615fd760SHA-256: a5e84e61162b71f0f9544161ce5d9b6c1afb1adfc339385f3a2c7be35574d822   x86_64: openssl097a-0.9.7a-12.el5_10.1.i386.rpm     MD5: 63a204f2d68437dc54a83f92424011d1SHA-256: 8bd83b5fea5df3b03379011ee7316b1561565d98436c53febd2c2ee3c54a900f openssl097a-0.9.7a-12.el5_10.1.x86_64.rpm     MD5: 4a56c28ff8afbb29a33cf359eb1263b8SHA-256: ca3201e4f9ffd08df6cc65d1e1a4ffd9146c7e7e2e9d759e10316469be298138 openssl097a-debuginfo-0.9.7a-12.el5_10.1.i386.rpm     MD5: c3b2dcb01c6325453c8a533a615fd760SHA-256: a5e84e61162b71f0f9544161ce5d9b6c1afb1adfc339385f3a2c7be35574d822 openssl097a-debuginfo-0.9.7a-12.el5_10.1.x86_64.rpm     MD5: 14c2b09c32908907b517a9a7cee7fa1fSHA-256: c544472a22c211092cff19159bf86fa5f57a4bc70fa9c9cac94e88916e04e317   Red Hat Enterprise Linux Desktop (v. 6) SRPMS: openssl098e-0.9.8e-18.el6_5.2.src.rpm     MD5: 36d96da1802b6305c3bc39a5fcebe97fSHA-256: 2561299d0983881128cb96e9be9f0fdcb62a93182bc7424de1d4b0051ef990d2   IA-32: openssl098e-0.9.8e-18.el6_5.2.i686.rpm     MD5: bedab7eb0bf4aa63eff2228bee693991SHA-256: d51b513736b132b6d40d0501ca31ecd7c20932174454e75b5584ffe421836048 openssl098e-debuginfo-0.9.8e-18.el6_5.2.i686.rpm     MD5: 3a013dd908f6626798f4b74f2840a0cdSHA-256: 1802a5fdce316c4da2879470dd9243ec00aa4c0315034707653be523e285479e   x86_64: openssl098e-0.9.8e-18.el6_5.2.i686.rpm     MD5: bedab7eb0bf4aa63eff2228bee693991SHA-256: d51b513736b132b6d40d0501ca31ecd7c20932174454e75b5584ffe421836048 openssl098e-0.9.8e-18.el6_5.2.x86_64.rpm     MD5: c423f22408c58136ddc7d67876d74a42SHA-256: c4257156e48aad24db60ebac28d9cbf9a107958d512202ccce164fcf844cea31 openssl098e-debuginfo-0.9.8e-18.el6_5.2.i686.rpm     MD5: 3a013dd908f6626798f4b74f2840a0cdSHA-256: 1802a5fdce316c4da2879470dd9243ec00aa4c0315034707653be523e285479e openssl098e-debuginfo-0.9.8e-18.el6_5.2.x86_64.rpm     MD5: 35f76ed2b7a506088c0e39d99def1c9dSHA-256: dcd8c17d11582d013fcb3d7aa926a3e5073db8c4e9a08e069d26f5d67b5e9b81   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: openssl098e-0.9.8e-18.el6_5.2.src.rpm     MD5: 36d96da1802b6305c3bc39a5fcebe97fSHA-256: 2561299d0983881128cb96e9be9f0fdcb62a93182bc7424de1d4b0051ef990d2   x86_64: openssl098e-0.9.8e-18.el6_5.2.i686.rpm     MD5: bedab7eb0bf4aa63eff2228bee693991SHA-256: d51b513736b132b6d40d0501ca31ecd7c20932174454e75b5584ffe421836048 openssl098e-0.9.8e-18.el6_5.2.x86_64.rpm     MD5: c423f22408c58136ddc7d67876d74a42SHA-256: c4257156e48aad24db60ebac28d9cbf9a107958d512202ccce164fcf844cea31 openssl098e-debuginfo-0.9.8e-18.el6_5.2.i686.rpm     MD5: 3a013dd908f6626798f4b74f2840a0cdSHA-256: 1802a5fdce316c4da2879470dd9243ec00aa4c0315034707653be523e285479e openssl098e-debuginfo-0.9.8e-18.el6_5.2.x86_64.rpm     MD5: 35f76ed2b7a506088c0e39d99def1c9dSHA-256: dcd8c17d11582d013fcb3d7aa926a3e5073db8c4e9a08e069d26f5d67b5e9b81   Red Hat Enterprise Linux Server (v. 6) SRPMS: openssl098e-0.9.8e-18.el6_5.2.src.rpm     MD5: 36d96da1802b6305c3bc39a5fcebe97fSHA-256: 2561299d0983881128cb96e9be9f0fdcb62a93182bc7424de1d4b0051ef990d2   IA-32: openssl098e-0.9.8e-18.el6_5.2.i686.rpm     MD5: bedab7eb0bf4aa63eff2228bee693991SHA-256: d51b513736b132b6d40d0501ca31ecd7c20932174454e75b5584ffe421836048 openssl098e-debuginfo-0.9.8e-18.el6_5.2.i686.rpm     MD5: 3a013dd908f6626798f4b74f2840a0cdSHA-256: 1802a5fdce316c4da2879470dd9243ec00aa4c0315034707653be523e285479e   PPC: openssl098e-0.9.8e-18.el6_5.2.ppc.rpm     MD5: 249e4ecad4c723bf724344701c99ca62SHA-256: b1d6d3ecc86c2df0c8f43b9bff93ec35b674482be1633b62d4bf8f3d76fe5e83 openssl098e-0.9.8e-18.el6_5.2.ppc64.rpm     MD5: 27d9b533663ffe3687cf0e0f0f612818SHA-256: f95ec65fb0b6f9af69d555a73205796595d5ed09ef9e6202db613f1c5153f39c openssl098e-debuginfo-0.9.8e-18.el6_5.2.ppc.rpm     MD5: 0e24d5cc64a34bec50a1356acfe14119SHA-256: 24268c14010ec91f4c867128c56053412584fd6e8fd85ed791d87c7104e0ab93 openssl098e-debuginfo-0.9.8e-18.el6_5.2.ppc64.rpm     MD5: 9e560b637c9abcbfd9c260f43bbf6fb0SHA-256: e8006fe2a4b5ab19fed619dcd22d02c4710611ce1ad3fad32c3075650cbce2d2   s390x: openssl098e-0.9.8e-18.el6_5.2.s390.rpm     MD5: 057fdd45396f51209f9988405f88d179SHA-256: 57b031581fc8c097bac4758342122863117a76e609c86129d5922916e42aaf97 openssl098e-0.9.8e-18.el6_5.2.s390x.rpm     MD5: 67a0526f2780a4fcedea7c6f83999cb4SHA-256: a1f2a4f4cf3042ff896af899a7a8cfc875a771f91ffa213e3476400251e7f489 openssl098e-debuginfo-0.9.8e-18.el6_5.2.s390.rpm     MD5: f0e84c740b6b61422c94c671200da4edSHA-256: d71f13e1813a3d94240617b4400c3e60512f7a2c4ddb2b06e978114939366760 openssl098e-debuginfo-0.9.8e-18.el6_5.2.s390x.rpm     MD5: c030e006a8d0d1b28286bd8891cb6ca4SHA-256: 4b19ad55f6ec0c8ad3640323e54a921b7206886dad006bd892ab2cac06df098b   x86_64: openssl098e-0.9.8e-18.el6_5.2.i686.rpm     MD5: bedab7eb0bf4aa63eff2228bee693991SHA-256: d51b513736b132b6d40d0501ca31ecd7c20932174454e75b5584ffe421836048 openssl098e-0.9.8e-18.el6_5.2.x86_64.rpm     MD5: c423f22408c58136ddc7d67876d74a42SHA-256: c4257156e48aad24db60ebac28d9cbf9a107958d512202ccce164fcf844cea31 openssl098e-debuginfo-0.9.8e-18.el6_5.2.i686.rpm     MD5: 3a013dd908f6626798f4b74f2840a0cdSHA-256: 1802a5fdce316c4da2879470dd9243ec00aa4c0315034707653be523e285479e openssl098e-debuginfo-0.9.8e-18.el6_5.2.x86_64.rpm     MD5: 35f76ed2b7a506088c0e39d99def1c9dSHA-256: dcd8c17d11582d013fcb3d7aa926a3e5073db8c4e9a08e069d26f5d67b5e9b81   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: openssl098e-0.9.8e-18.el6_5.2.src.rpm     MD5: 36d96da1802b6305c3bc39a5fcebe97fSHA-256: 2561299d0983881128cb96e9be9f0fdcb62a93182bc7424de1d4b0051ef990d2   x86_64: openssl098e-0.9.8e-18.el6_5.2.i686.rpm     MD5: bedab7eb0bf4aa63eff2228bee693991SHA-256: d51b513736b132b6d40d0501ca31ecd7c20932174454e75b5584ffe421836048 openssl098e-0.9.8e-18.el6_5.2.x86_64.rpm     MD5: c423f22408c58136ddc7d67876d74a42SHA-256: c4257156e48aad24db60ebac28d9cbf9a107958d512202ccce164fcf844cea31 openssl098e-debuginfo-0.9.8e-18.el6_5.2.i686.rpm     MD5: 3a013dd908f6626798f4b74f2840a0cdSHA-256: 1802a5fdce316c4da2879470dd9243ec00aa4c0315034707653be523e285479e openssl098e-debuginfo-0.9.8e-18.el6_5.2.x86_64.rpm     MD5: 35f76ed2b7a506088c0e39d99def1c9dSHA-256: dcd8c17d11582d013fcb3d7aa926a3e5073db8c4e9a08e069d26f5d67b5e9b81   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: openssl098e-0.9.8e-18.el6_5.2.src.rpm     MD5: 36d96da1802b6305c3bc39a5fcebe97fSHA-256: 2561299d0983881128cb96e9be9f0fdcb62a93182bc7424de1d4b0051ef990d2   IA-32: openssl098e-0.9.8e-18.el6_5.2.i686.rpm     MD5: bedab7eb0bf4aa63eff2228bee693991SHA-256: d51b513736b132b6d40d0501ca31ecd7c20932174454e75b5584ffe421836048 openssl098e-debuginfo-0.9.8e-18.el6_5.2.i686.rpm     MD5: 3a013dd908f6626798f4b74f2840a0cdSHA-256: 1802a5fdce316c4da2879470dd9243ec00aa4c0315034707653be523e285479e   PPC: openssl098e-0.9.8e-18.el6_5.2.ppc.rpm     MD5: 249e4ecad4c723bf724344701c99ca62SHA-256: b1d6d3ecc86c2df0c8f43b9bff93ec35b674482be1633b62d4bf8f3d76fe5e83 openssl098e-0.9.8e-18.el6_5.2.ppc64.rpm     MD5: 27d9b533663ffe3687cf0e0f0f612818SHA-256: f95ec65fb0b6f9af69d555a73205796595d5ed09ef9e6202db613f1c5153f39c openssl098e-debuginfo-0.9.8e-18.el6_5.2.ppc.rpm     MD5: 0e24d5cc64a34bec50a1356acfe14119SHA-256: 24268c14010ec91f4c867128c56053412584fd6e8fd85ed791d87c7104e0ab93 openssl098e-debuginfo-0.9.8e-18.el6_5.2.ppc64.rpm     MD5: 9e560b637c9abcbfd9c260f43bbf6fb0SHA-256: e8006fe2a4b5ab19fed619dcd22d02c4710611ce1ad3fad32c3075650cbce2d2   s390x: openssl098e-0.9.8e-18.el6_5.2.s390.rpm     MD5: 057fdd45396f51209f9988405f88d179SHA-256: 57b031581fc8c097bac4758342122863117a76e609c86129d5922916e42aaf97 openssl098e-0.9.8e-18.el6_5.2.s390x.rpm     MD5: 67a0526f2780a4fcedea7c6f83999cb4SHA-256: a1f2a4f4cf3042ff896af899a7a8cfc875a771f91ffa213e3476400251e7f489 openssl098e-debuginfo-0.9.8e-18.el6_5.2.s390.rpm     MD5: f0e84c740b6b61422c94c671200da4edSHA-256: d71f13e1813a3d94240617b4400c3e60512f7a2c4ddb2b06e978114939366760 openssl098e-debuginfo-0.9.8e-18.el6_5.2.s390x.rpm     MD5: c030e006a8d0d1b28286bd8891cb6ca4SHA-256: 4b19ad55f6ec0c8ad3640323e54a921b7206886dad006bd892ab2cac06df098b   x86_64: openssl098e-0.9.8e-18.el6_5.2.i686.rpm     MD5: bedab7eb0bf4aa63eff2228bee693991SHA-256: d51b513736b132b6d40d0501ca31ecd7c20932174454e75b5584ffe421836048 openssl098e-0.9.8e-18.el6_5.2.x86_64.rpm     MD5: c423f22408c58136ddc7d67876d74a42SHA-256: c4257156e48aad24db60ebac28d9cbf9a107958d512202ccce164fcf844cea31 openssl098e-debuginfo-0.9.8e-18.el6_5.2.i686.rpm     MD5: 3a013dd908f6626798f4b74f2840a0cdSHA-256: 1802a5fdce316c4da2879470dd9243ec00aa4c0315034707653be523e285479e openssl098e-debuginfo-0.9.8e-18.el6_5.2.x86_64.rpm     MD5: 35f76ed2b7a506088c0e39d99def1c9dSHA-256: dcd8c17d11582d013fcb3d7aa926a3e5073db8c4e9a08e069d26f5d67b5e9b81   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: openssl098e-0.9.8e-18.el6_5.2.src.rpm     MD5: 36d96da1802b6305c3bc39a5fcebe97fSHA-256: 2561299d0983881128cb96e9be9f0fdcb62a93182bc7424de1d4b0051ef990d2   IA-32: openssl098e-0.9.8e-18.el6_5.2.i686.rpm     MD5: bedab7eb0bf4aa63eff2228bee693991SHA-256: d51b513736b132b6d40d0501ca31ecd7c20932174454e75b5584ffe421836048 openssl098e-debuginfo-0.9.8e-18.el6_5.2.i686.rpm     MD5: 3a013dd908f6626798f4b74f2840a0cdSHA-256: 1802a5fdce316c4da2879470dd9243ec00aa4c0315034707653be523e285479e   x86_64: openssl098e-0.9.8e-18.el6_5.2.i686.rpm     MD5: bedab7eb0bf4aa63eff2228bee693991SHA-256: d51b513736b132b6d40d0501ca31ecd7c20932174454e75b5584ffe421836048 openssl098e-0.9.8e-18.el6_5.2.x86_64.rpm     MD5: c423f22408c58136ddc7d67876d74a42SHA-256: c4257156e48aad24db60ebac28d9cbf9a107958d512202ccce164fcf844cea31 openssl098e-debuginfo-0.9.8e-18.el6_5.2.i686.rpm     MD5: 3a013dd908f6626798f4b74f2840a0cdSHA-256: 1802a5fdce316c4da2879470dd9243ec00aa4c0315034707653be523e285479e openssl098e-debuginfo-0.9.8e-18.el6_5.2.x86_64.rpm     MD5: 35f76ed2b7a506088c0e39d99def1c9dSHA-256: dcd8c17d11582d013fcb3d7aa926a3e5073db8c4e9a08e069d26f5d67b5e9b81   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2014:0625-1: Important: openssl security update

Updated openssl packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 6.The Red Hat Security Response Team has rated this update as havingImportant security impact. Common Vulnerability Scoring System (CVSS) basescores, which give detailed severity ratings, are available for eachvulnerability from the CVE links in the References section. OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)and Transport Layer Security (TLS v1) protocols, as well as afull-strength, general purpose cryptography library.It was found that OpenSSL clients and servers could be forced, via aspecially crafted handshake packet, to use weak keying material forcommunication. A man-in-the-middle attacker could use this flaw to decryptand modify traffic between a client and a server. (CVE-2014-0224)Note: In order to exploit this flaw, both the server and the client must beusing a vulnerable version of OpenSSL; the server must be using OpenSSLversion 1.0.1 and above, and the client must be using any version ofOpenSSL. For more information about this flaw, refer to:https://access.redhat.com/site/articles/904433A buffer overflow flaw was found in the way OpenSSL handled invalid DTLSpacket fragments. A remote attacker could possibly use this flaw to executearbitrary code on a DTLS client or server. (CVE-2014-0195)Multiple flaws were found in the way OpenSSL handled read and write bufferswhen the SSL_MODE_RELEASE_BUFFERS mode was enabled. A TLS/SSL client orserver using OpenSSL could crash or unexpectedly drop connections whenprocessing certain SSL traffic. (CVE-2010-5298, CVE-2014-0198)A denial of service flaw was found in the way OpenSSL handled certain DTLSServerHello requests. A specially crafted DTLS handshake packet could causea DTLS client using OpenSSL to crash. (CVE-2014-0221)A NULL pointer dereference flaw was found in the way OpenSSL performedanonymous Elliptic Curve Diffie Hellman (ECDH) key exchange. A speciallycrafted handshake packet could cause a TLS/SSL client that has theanonymous ECDH cipher suite enabled to crash. (CVE-2014-3470)Red Hat would like to thank the OpenSSL project for reporting these issues.Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporterof CVE-2014-0224, Jüri Aedla as the original reporter of CVE-2014-0195,Imre Rad of Search-Lab as the original reporter of CVE-2014-0221, and FelixGröbert and Ivan Fratrić of Google as the original reporters ofCVE-2014-3470.All OpenSSL users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. For the update to takeeffect, all services linked to the OpenSSL library (such as httpd and otherSSL-enabled services) must be restarted or the system rebooted. Red Hat Enterprise Linux Desktop (v. 6) SRPMS: openssl-1.0.1e-16.el6_5.14.src.rpm     MD5: 162e9502a19e07c0bdf7b38afd7d172fSHA-256: ab68fd1c76bf8c255702fac80d6e704cb9bc00e0dbf5156ecc6925a457621d40   IA-32: openssl-1.0.1e-16.el6_5.14.i686.rpm     MD5: 44859a9c8d10af3850c42dd2a4822eeaSHA-256: 4b50797eb0921b176f3788b042473441e6469b21d9b647394f7db7624661c731 openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm     MD5: 909cb0303ae5615f4216e13ebf0b2016SHA-256: b1666b1ba41c13672316eb93c2c0f2727c114a8631341d976cc8c0ba07839e56 openssl-devel-1.0.1e-16.el6_5.14.i686.rpm     MD5: da8eff381c902443ddfa8d7a52a2ceb5SHA-256: 90f27cc7ed3451782a3521a8c1c38ed9d983c2e2a31de716a07b6d95f1fde3b8 openssl-perl-1.0.1e-16.el6_5.14.i686.rpm     MD5: 7151a2e480ee2624074cdb7c741b98e4SHA-256: f247fb6a5fe1a0f53bff3d3f1d36a397ddcafab3d29aeff6027f4e8814fd9c18 openssl-static-1.0.1e-16.el6_5.14.i686.rpm     MD5: 79495e8fbeb86ee1bd49226c68f1777cSHA-256: a8ff5121d39822cfeda6ee4af7719f28ec3ea6357c052bdb2ec55d4c2c7ebd00   x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm     MD5: 44859a9c8d10af3850c42dd2a4822eeaSHA-256: 4b50797eb0921b176f3788b042473441e6469b21d9b647394f7db7624661c731 openssl-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: ad2972e24df86beb4fedad15024d2aeaSHA-256: 4ea27a628dc8a23c4f5e15c28e76a9949f44e568a47475e78cad871492bc4a03 openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm     MD5: 909cb0303ae5615f4216e13ebf0b2016SHA-256: b1666b1ba41c13672316eb93c2c0f2727c114a8631341d976cc8c0ba07839e56 openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: 0934b6c2d1eac77533f68db06b613e3cSHA-256: 6e12023bb8869c32d288a5f9d87846b82124777481762044b36c79c2cdaee40d openssl-devel-1.0.1e-16.el6_5.14.i686.rpm     MD5: da8eff381c902443ddfa8d7a52a2ceb5SHA-256: 90f27cc7ed3451782a3521a8c1c38ed9d983c2e2a31de716a07b6d95f1fde3b8 openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: f6f157a51527e6dbe330d5d18c0e59f2SHA-256: e87ce459cf7c2b3687fd702bc9a8beba8218b4ec33cfe9de33d8e8888828dcef openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: ccb46e0840139e77e2b41cc6b5c556f6SHA-256: 1fbd2f2ba169cf924976b7529ddabbb676f1714689e36f06ccd47c0c380ba041 openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: 29a3460b0dfb74dd18c1a8724dec75adSHA-256: 1b55e916753f4e976ad4e6a26d19c3f0e9dbc9b19229a2014f3fa8b52142553e   Red Hat Enterprise Linux HPC Node (v. 6) SRPMS: openssl-1.0.1e-16.el6_5.14.src.rpm     MD5: 162e9502a19e07c0bdf7b38afd7d172fSHA-256: ab68fd1c76bf8c255702fac80d6e704cb9bc00e0dbf5156ecc6925a457621d40   x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm     MD5: 44859a9c8d10af3850c42dd2a4822eeaSHA-256: 4b50797eb0921b176f3788b042473441e6469b21d9b647394f7db7624661c731 openssl-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: ad2972e24df86beb4fedad15024d2aeaSHA-256: 4ea27a628dc8a23c4f5e15c28e76a9949f44e568a47475e78cad871492bc4a03 openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm     MD5: 909cb0303ae5615f4216e13ebf0b2016SHA-256: b1666b1ba41c13672316eb93c2c0f2727c114a8631341d976cc8c0ba07839e56 openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: 0934b6c2d1eac77533f68db06b613e3cSHA-256: 6e12023bb8869c32d288a5f9d87846b82124777481762044b36c79c2cdaee40d openssl-devel-1.0.1e-16.el6_5.14.i686.rpm     MD5: da8eff381c902443ddfa8d7a52a2ceb5SHA-256: 90f27cc7ed3451782a3521a8c1c38ed9d983c2e2a31de716a07b6d95f1fde3b8 openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: f6f157a51527e6dbe330d5d18c0e59f2SHA-256: e87ce459cf7c2b3687fd702bc9a8beba8218b4ec33cfe9de33d8e8888828dcef openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: ccb46e0840139e77e2b41cc6b5c556f6SHA-256: 1fbd2f2ba169cf924976b7529ddabbb676f1714689e36f06ccd47c0c380ba041 openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: 29a3460b0dfb74dd18c1a8724dec75adSHA-256: 1b55e916753f4e976ad4e6a26d19c3f0e9dbc9b19229a2014f3fa8b52142553e   Red Hat Enterprise Linux Server (v. 6) SRPMS: openssl-1.0.1e-16.el6_5.14.src.rpm     MD5: 162e9502a19e07c0bdf7b38afd7d172fSHA-256: ab68fd1c76bf8c255702fac80d6e704cb9bc00e0dbf5156ecc6925a457621d40   IA-32: openssl-1.0.1e-16.el6_5.14.i686.rpm     MD5: 44859a9c8d10af3850c42dd2a4822eeaSHA-256: 4b50797eb0921b176f3788b042473441e6469b21d9b647394f7db7624661c731 openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm     MD5: 909cb0303ae5615f4216e13ebf0b2016SHA-256: b1666b1ba41c13672316eb93c2c0f2727c114a8631341d976cc8c0ba07839e56 openssl-devel-1.0.1e-16.el6_5.14.i686.rpm     MD5: da8eff381c902443ddfa8d7a52a2ceb5SHA-256: 90f27cc7ed3451782a3521a8c1c38ed9d983c2e2a31de716a07b6d95f1fde3b8 openssl-perl-1.0.1e-16.el6_5.14.i686.rpm     MD5: 7151a2e480ee2624074cdb7c741b98e4SHA-256: f247fb6a5fe1a0f53bff3d3f1d36a397ddcafab3d29aeff6027f4e8814fd9c18 openssl-static-1.0.1e-16.el6_5.14.i686.rpm     MD5: 79495e8fbeb86ee1bd49226c68f1777cSHA-256: a8ff5121d39822cfeda6ee4af7719f28ec3ea6357c052bdb2ec55d4c2c7ebd00   PPC: openssl-1.0.1e-16.el6_5.14.ppc.rpm     MD5: 050807fd08d3ab7308bf6a91f8cf87a8SHA-256: 3bdc036bbac5a9eec57314ed942f49782bf71be02a9c6031d02826fdeab3eb04 openssl-1.0.1e-16.el6_5.14.ppc64.rpm     MD5: a9611c6c2071e8614f86b2be523ccdacSHA-256: e8b577eccaa28e6c31c4f43ec2b281bd36e669526c28dd8edd9d8bbd7aa6d455 openssl-debuginfo-1.0.1e-16.el6_5.14.ppc.rpm     MD5: dd8f5f0e47fe993ac8f2c17528b32c27SHA-256: d386ed56c150d1fb4564dbf6ab0a1a4673c765b10d63972a8629f3287d189421 openssl-debuginfo-1.0.1e-16.el6_5.14.ppc64.rpm     MD5: 56ee426ead6fc7b9e0cdb69b385d3c7cSHA-256: eeae5f00378192bfc8d533864665eeb93a0f9c94405e7a73b53f4abb7bd3817a openssl-devel-1.0.1e-16.el6_5.14.ppc.rpm     MD5: 3201f8d1b0d77127c78e2db581fbecebSHA-256: af6ff5ece0d6f08317f0c5a8e390c47238608a5d49a9beec83275ef4b148fd8f openssl-devel-1.0.1e-16.el6_5.14.ppc64.rpm     MD5: f4eace36080b7aa37260115107f5e657SHA-256: f1bf095c0268e6f2021e7a1ef7c6fcc99041e2ea11da3c47ff19eebd4ef055cd openssl-perl-1.0.1e-16.el6_5.14.ppc64.rpm     MD5: 229e85cab03a45586c750474834ada89SHA-256: 923a642d3131e2615443626dd6c304935f3753b637e7103977da2f50c7ca0085 openssl-static-1.0.1e-16.el6_5.14.ppc64.rpm     MD5: 4170793c358292641478f4b11360e7c7SHA-256: 4aafc99b0f38a2494fbf80dc1f65a7b0e5bbe0810d7767cbfea49057a2ba3392   s390x: openssl-1.0.1e-16.el6_5.14.s390.rpm     MD5: 46b4f28f28822ce29012351a8e6e9138SHA-256: 9fe5cdb7c18e123a07d383bd3c5e22271ce6993d98be3ef87bafb0e1d9c96042 openssl-1.0.1e-16.el6_5.14.s390x.rpm     MD5: c9c7a2a35561776463168fb202ea0d68SHA-256: 8d3621205762eb9e00047724e446ace96236fd4a5fb4d1ea16b867d63b3f74d6 openssl-debuginfo-1.0.1e-16.el6_5.14.s390.rpm     MD5: 442ce17d08e3df903f16c3f55519b4e0SHA-256: 9756e7dfb21e0709e2a469aea56714ed38f8ba19bec1b0046815244b854e0b19 openssl-debuginfo-1.0.1e-16.el6_5.14.s390x.rpm     MD5: 3c0463244711a093cb3eb779dd746563SHA-256: bb7b484e6b14e9c4b60f6968b7f0d79704be4928a32f038c0dfeb4ccaf255c1e openssl-devel-1.0.1e-16.el6_5.14.s390.rpm     MD5: 5edb2b7d8845b299954bebdb74b16afdSHA-256: 8fc075fbee182bdbf74d03f80001ea19ab3e0295863647337c97b92f0030b78e openssl-devel-1.0.1e-16.el6_5.14.s390x.rpm     MD5: 0e74aeec9d394ae162b57157c08ff307SHA-256: d4f571e63f95826cbc42c950ad7659c2d11b061fff1cea039cbe748b66356753 openssl-perl-1.0.1e-16.el6_5.14.s390x.rpm     MD5: 8e33cd472402159c59ddc86c575f452bSHA-256: 2e3def534a6d1d592957205cd59504e67f59e1e68aacf7eb277b1ca7b41144e1 openssl-static-1.0.1e-16.el6_5.14.s390x.rpm     MD5: 01329523d0c0fea7b67562809aba7c97SHA-256: 21fc656966d280a00e92e1803a79d8b9d5653145df913fe4b6dc218fee655a9e   x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm     MD5: 44859a9c8d10af3850c42dd2a4822eeaSHA-256: 4b50797eb0921b176f3788b042473441e6469b21d9b647394f7db7624661c731 openssl-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: ad2972e24df86beb4fedad15024d2aeaSHA-256: 4ea27a628dc8a23c4f5e15c28e76a9949f44e568a47475e78cad871492bc4a03 openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm     MD5: 909cb0303ae5615f4216e13ebf0b2016SHA-256: b1666b1ba41c13672316eb93c2c0f2727c114a8631341d976cc8c0ba07839e56 openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: 0934b6c2d1eac77533f68db06b613e3cSHA-256: 6e12023bb8869c32d288a5f9d87846b82124777481762044b36c79c2cdaee40d openssl-devel-1.0.1e-16.el6_5.14.i686.rpm     MD5: da8eff381c902443ddfa8d7a52a2ceb5SHA-256: 90f27cc7ed3451782a3521a8c1c38ed9d983c2e2a31de716a07b6d95f1fde3b8 openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: f6f157a51527e6dbe330d5d18c0e59f2SHA-256: e87ce459cf7c2b3687fd702bc9a8beba8218b4ec33cfe9de33d8e8888828dcef openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: ccb46e0840139e77e2b41cc6b5c556f6SHA-256: 1fbd2f2ba169cf924976b7529ddabbb676f1714689e36f06ccd47c0c380ba041 openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: 29a3460b0dfb74dd18c1a8724dec75adSHA-256: 1b55e916753f4e976ad4e6a26d19c3f0e9dbc9b19229a2014f3fa8b52142553e   Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: openssl-1.0.1e-16.el6_5.14.src.rpm     MD5: 162e9502a19e07c0bdf7b38afd7d172fSHA-256: ab68fd1c76bf8c255702fac80d6e704cb9bc00e0dbf5156ecc6925a457621d40   x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm     MD5: 44859a9c8d10af3850c42dd2a4822eeaSHA-256: 4b50797eb0921b176f3788b042473441e6469b21d9b647394f7db7624661c731 openssl-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: ad2972e24df86beb4fedad15024d2aeaSHA-256: 4ea27a628dc8a23c4f5e15c28e76a9949f44e568a47475e78cad871492bc4a03 openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm     MD5: 909cb0303ae5615f4216e13ebf0b2016SHA-256: b1666b1ba41c13672316eb93c2c0f2727c114a8631341d976cc8c0ba07839e56 openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: 0934b6c2d1eac77533f68db06b613e3cSHA-256: 6e12023bb8869c32d288a5f9d87846b82124777481762044b36c79c2cdaee40d openssl-devel-1.0.1e-16.el6_5.14.i686.rpm     MD5: da8eff381c902443ddfa8d7a52a2ceb5SHA-256: 90f27cc7ed3451782a3521a8c1c38ed9d983c2e2a31de716a07b6d95f1fde3b8 openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: f6f157a51527e6dbe330d5d18c0e59f2SHA-256: e87ce459cf7c2b3687fd702bc9a8beba8218b4ec33cfe9de33d8e8888828dcef openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: ccb46e0840139e77e2b41cc6b5c556f6SHA-256: 1fbd2f2ba169cf924976b7529ddabbb676f1714689e36f06ccd47c0c380ba041 openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: 29a3460b0dfb74dd18c1a8724dec75adSHA-256: 1b55e916753f4e976ad4e6a26d19c3f0e9dbc9b19229a2014f3fa8b52142553e   Red Hat Enterprise Linux Server EUS (v. 6.5.z) SRPMS: openssl-1.0.1e-16.el6_5.14.src.rpm     MD5: 162e9502a19e07c0bdf7b38afd7d172fSHA-256: ab68fd1c76bf8c255702fac80d6e704cb9bc00e0dbf5156ecc6925a457621d40   IA-32: openssl-1.0.1e-16.el6_5.14.i686.rpm     MD5: 44859a9c8d10af3850c42dd2a4822eeaSHA-256: 4b50797eb0921b176f3788b042473441e6469b21d9b647394f7db7624661c731 openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm     MD5: 909cb0303ae5615f4216e13ebf0b2016SHA-256: b1666b1ba41c13672316eb93c2c0f2727c114a8631341d976cc8c0ba07839e56 openssl-devel-1.0.1e-16.el6_5.14.i686.rpm     MD5: da8eff381c902443ddfa8d7a52a2ceb5SHA-256: 90f27cc7ed3451782a3521a8c1c38ed9d983c2e2a31de716a07b6d95f1fde3b8 openssl-perl-1.0.1e-16.el6_5.14.i686.rpm     MD5: 7151a2e480ee2624074cdb7c741b98e4SHA-256: f247fb6a5fe1a0f53bff3d3f1d36a397ddcafab3d29aeff6027f4e8814fd9c18 openssl-static-1.0.1e-16.el6_5.14.i686.rpm     MD5: 79495e8fbeb86ee1bd49226c68f1777cSHA-256: a8ff5121d39822cfeda6ee4af7719f28ec3ea6357c052bdb2ec55d4c2c7ebd00   PPC: openssl-1.0.1e-16.el6_5.14.ppc.rpm     MD5: 050807fd08d3ab7308bf6a91f8cf87a8SHA-256: 3bdc036bbac5a9eec57314ed942f49782bf71be02a9c6031d02826fdeab3eb04 openssl-1.0.1e-16.el6_5.14.ppc64.rpm     MD5: a9611c6c2071e8614f86b2be523ccdacSHA-256: e8b577eccaa28e6c31c4f43ec2b281bd36e669526c28dd8edd9d8bbd7aa6d455 openssl-debuginfo-1.0.1e-16.el6_5.14.ppc.rpm     MD5: dd8f5f0e47fe993ac8f2c17528b32c27SHA-256: d386ed56c150d1fb4564dbf6ab0a1a4673c765b10d63972a8629f3287d189421 openssl-debuginfo-1.0.1e-16.el6_5.14.ppc64.rpm     MD5: 56ee426ead6fc7b9e0cdb69b385d3c7cSHA-256: eeae5f00378192bfc8d533864665eeb93a0f9c94405e7a73b53f4abb7bd3817a openssl-devel-1.0.1e-16.el6_5.14.ppc.rpm     MD5: 3201f8d1b0d77127c78e2db581fbecebSHA-256: af6ff5ece0d6f08317f0c5a8e390c47238608a5d49a9beec83275ef4b148fd8f openssl-devel-1.0.1e-16.el6_5.14.ppc64.rpm     MD5: f4eace36080b7aa37260115107f5e657SHA-256: f1bf095c0268e6f2021e7a1ef7c6fcc99041e2ea11da3c47ff19eebd4ef055cd openssl-perl-1.0.1e-16.el6_5.14.ppc64.rpm     MD5: 229e85cab03a45586c750474834ada89SHA-256: 923a642d3131e2615443626dd6c304935f3753b637e7103977da2f50c7ca0085 openssl-static-1.0.1e-16.el6_5.14.ppc64.rpm     MD5: 4170793c358292641478f4b11360e7c7SHA-256: 4aafc99b0f38a2494fbf80dc1f65a7b0e5bbe0810d7767cbfea49057a2ba3392   s390x: openssl-1.0.1e-16.el6_5.14.s390.rpm     MD5: 46b4f28f28822ce29012351a8e6e9138SHA-256: 9fe5cdb7c18e123a07d383bd3c5e22271ce6993d98be3ef87bafb0e1d9c96042 openssl-1.0.1e-16.el6_5.14.s390x.rpm     MD5: c9c7a2a35561776463168fb202ea0d68SHA-256: 8d3621205762eb9e00047724e446ace96236fd4a5fb4d1ea16b867d63b3f74d6 openssl-debuginfo-1.0.1e-16.el6_5.14.s390.rpm     MD5: 442ce17d08e3df903f16c3f55519b4e0SHA-256: 9756e7dfb21e0709e2a469aea56714ed38f8ba19bec1b0046815244b854e0b19 openssl-debuginfo-1.0.1e-16.el6_5.14.s390x.rpm     MD5: 3c0463244711a093cb3eb779dd746563SHA-256: bb7b484e6b14e9c4b60f6968b7f0d79704be4928a32f038c0dfeb4ccaf255c1e openssl-devel-1.0.1e-16.el6_5.14.s390.rpm     MD5: 5edb2b7d8845b299954bebdb74b16afdSHA-256: 8fc075fbee182bdbf74d03f80001ea19ab3e0295863647337c97b92f0030b78e openssl-devel-1.0.1e-16.el6_5.14.s390x.rpm     MD5: 0e74aeec9d394ae162b57157c08ff307SHA-256: d4f571e63f95826cbc42c950ad7659c2d11b061fff1cea039cbe748b66356753 openssl-perl-1.0.1e-16.el6_5.14.s390x.rpm     MD5: 8e33cd472402159c59ddc86c575f452bSHA-256: 2e3def534a6d1d592957205cd59504e67f59e1e68aacf7eb277b1ca7b41144e1 openssl-static-1.0.1e-16.el6_5.14.s390x.rpm     MD5: 01329523d0c0fea7b67562809aba7c97SHA-256: 21fc656966d280a00e92e1803a79d8b9d5653145df913fe4b6dc218fee655a9e   x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm     MD5: 44859a9c8d10af3850c42dd2a4822eeaSHA-256: 4b50797eb0921b176f3788b042473441e6469b21d9b647394f7db7624661c731 openssl-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: ad2972e24df86beb4fedad15024d2aeaSHA-256: 4ea27a628dc8a23c4f5e15c28e76a9949f44e568a47475e78cad871492bc4a03 openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm     MD5: 909cb0303ae5615f4216e13ebf0b2016SHA-256: b1666b1ba41c13672316eb93c2c0f2727c114a8631341d976cc8c0ba07839e56 openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: 0934b6c2d1eac77533f68db06b613e3cSHA-256: 6e12023bb8869c32d288a5f9d87846b82124777481762044b36c79c2cdaee40d openssl-devel-1.0.1e-16.el6_5.14.i686.rpm     MD5: da8eff381c902443ddfa8d7a52a2ceb5SHA-256: 90f27cc7ed3451782a3521a8c1c38ed9d983c2e2a31de716a07b6d95f1fde3b8 openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: f6f157a51527e6dbe330d5d18c0e59f2SHA-256: e87ce459cf7c2b3687fd702bc9a8beba8218b4ec33cfe9de33d8e8888828dcef openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: ccb46e0840139e77e2b41cc6b5c556f6SHA-256: 1fbd2f2ba169cf924976b7529ddabbb676f1714689e36f06ccd47c0c380ba041 openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: 29a3460b0dfb74dd18c1a8724dec75adSHA-256: 1b55e916753f4e976ad4e6a26d19c3f0e9dbc9b19229a2014f3fa8b52142553e   Red Hat Enterprise Linux Workstation (v. 6) SRPMS: openssl-1.0.1e-16.el6_5.14.src.rpm     MD5: 162e9502a19e07c0bdf7b38afd7d172fSHA-256: ab68fd1c76bf8c255702fac80d6e704cb9bc00e0dbf5156ecc6925a457621d40   IA-32: openssl-1.0.1e-16.el6_5.14.i686.rpm     MD5: 44859a9c8d10af3850c42dd2a4822eeaSHA-256: 4b50797eb0921b176f3788b042473441e6469b21d9b647394f7db7624661c731 openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm     MD5: 909cb0303ae5615f4216e13ebf0b2016SHA-256: b1666b1ba41c13672316eb93c2c0f2727c114a8631341d976cc8c0ba07839e56 openssl-devel-1.0.1e-16.el6_5.14.i686.rpm     MD5: da8eff381c902443ddfa8d7a52a2ceb5SHA-256: 90f27cc7ed3451782a3521a8c1c38ed9d983c2e2a31de716a07b6d95f1fde3b8 openssl-perl-1.0.1e-16.el6_5.14.i686.rpm     MD5: 7151a2e480ee2624074cdb7c741b98e4SHA-256: f247fb6a5fe1a0f53bff3d3f1d36a397ddcafab3d29aeff6027f4e8814fd9c18 openssl-static-1.0.1e-16.el6_5.14.i686.rpm     MD5: 79495e8fbeb86ee1bd49226c68f1777cSHA-256: a8ff5121d39822cfeda6ee4af7719f28ec3ea6357c052bdb2ec55d4c2c7ebd00   x86_64: openssl-1.0.1e-16.el6_5.14.i686.rpm     MD5: 44859a9c8d10af3850c42dd2a4822eeaSHA-256: 4b50797eb0921b176f3788b042473441e6469b21d9b647394f7db7624661c731 openssl-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: ad2972e24df86beb4fedad15024d2aeaSHA-256: 4ea27a628dc8a23c4f5e15c28e76a9949f44e568a47475e78cad871492bc4a03 openssl-debuginfo-1.0.1e-16.el6_5.14.i686.rpm     MD5: 909cb0303ae5615f4216e13ebf0b2016SHA-256: b1666b1ba41c13672316eb93c2c0f2727c114a8631341d976cc8c0ba07839e56 openssl-debuginfo-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: 0934b6c2d1eac77533f68db06b613e3cSHA-256: 6e12023bb8869c32d288a5f9d87846b82124777481762044b36c79c2cdaee40d openssl-devel-1.0.1e-16.el6_5.14.i686.rpm     MD5: da8eff381c902443ddfa8d7a52a2ceb5SHA-256: 90f27cc7ed3451782a3521a8c1c38ed9d983c2e2a31de716a07b6d95f1fde3b8 openssl-devel-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: f6f157a51527e6dbe330d5d18c0e59f2SHA-256: e87ce459cf7c2b3687fd702bc9a8beba8218b4ec33cfe9de33d8e8888828dcef openssl-perl-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: ccb46e0840139e77e2b41cc6b5c556f6SHA-256: 1fbd2f2ba169cf924976b7529ddabbb676f1714689e36f06ccd47c0c380ba041 openssl-static-1.0.1e-16.el6_5.14.x86_64.rpm     MD5: 29a3460b0dfb74dd18c1a8724dec75adSHA-256: 1b55e916753f4e976ad4e6a26d19c3f0e9dbc9b19229a2014f3fa8b52142553e   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHSA-2014:0624-1: Important: openssl security update

Updated openssl packages that fix one security issue are now available forRed Hat Enterprise Linux 5.The Red Hat Security Response Team has rated this update as havingImportant security impact. A Common Vulnerability Scoring System (CVSS)base score, which gives a detailed severity rating, is available from theCVE link in the References section. OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)and Transport Layer Security (TLS v1) protocols, as well as afull-strength, general purpose cryptography library.It was found that OpenSSL clients and servers could be forced, via aspecially crafted handshake packet, to use weak keying material forcommunication. A man-in-the-middle attacker could use this flaw to decryptand modify traffic between a client and a server. (CVE-2014-0224)Note: In order to exploit this flaw, both the server and the client must beusing a vulnerable version of OpenSSL; the server must be using OpenSSLversion 1.0.1 and above, and the client must be using any version ofOpenSSL. For more information about this flaw, refer to:https://access.redhat.com/site/articles/904433Red Hat would like to thank the OpenSSL project for reporting this issue.Upstream acknowledges KIKUCHI Masashi of Lepidum as the original reporterof this issue.All OpenSSL users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. For the update to takeeffect, all services linked to the OpenSSL library (such as httpd and otherSSL-enabled services) must be restarted or the system rebooted. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258RHEL Desktop Workstation (v. 5 client) SRPMS: openssl-0.9.8e-27.el5_10.3.src.rpm     MD5: 3272e3435050704fe38bccafd897bd48SHA-256: 91a8b5889c3c534053fbad42bbda404b15258432639053e9192ca41eef12fead   IA-32: openssl-debuginfo-0.9.8e-27.el5_10.3.i386.rpm     MD5: 219511a848129df97c19c7a1776a4632SHA-256: 5557c93466eb664f5df30786672c4ea2fa58049f9b75a5b5f385b804037fd5b2 openssl-devel-0.9.8e-27.el5_10.3.i386.rpm     MD5: e1c5d23a5af189405f1c73ffc222c02aSHA-256: e79b6c231dea63b74084b51b93292cc69e766a424f35b01cd749a1c22a1d89f8   x86_64: openssl-debuginfo-0.9.8e-27.el5_10.3.i386.rpm     MD5: 219511a848129df97c19c7a1776a4632SHA-256: 5557c93466eb664f5df30786672c4ea2fa58049f9b75a5b5f385b804037fd5b2 openssl-debuginfo-0.9.8e-27.el5_10.3.x86_64.rpm     MD5: 7c7f6a1473e4f02134e186b9c5ff2d81SHA-256: e0b53c1abc5bedfaca569291aa92017d9bdfe85fcbd3c0fa9b332e7fcd63ab6b openssl-devel-0.9.8e-27.el5_10.3.i386.rpm     MD5: e1c5d23a5af189405f1c73ffc222c02aSHA-256: e79b6c231dea63b74084b51b93292cc69e766a424f35b01cd749a1c22a1d89f8 openssl-devel-0.9.8e-27.el5_10.3.x86_64.rpm     MD5: 7ed5f4c752493a1e230963eec7526807SHA-256: 6f59ac1d818133b4a7d6da5c4a0a1e7bb0b6eec9048035668005427fa184c2f8   Red Hat Enterprise Linux (v. 5 server) SRPMS: openssl-0.9.8e-27.el5_10.3.src.rpm     MD5: 3272e3435050704fe38bccafd897bd48SHA-256: 91a8b5889c3c534053fbad42bbda404b15258432639053e9192ca41eef12fead   IA-32: openssl-0.9.8e-27.el5_10.3.i386.rpm     MD5: 26fd9466593fbbf38e3704add559ecf7SHA-256: 8cb59d50a7dbfa0653c9b7b7f84225432ba851840188d78a7a221878ecb35adb openssl-0.9.8e-27.el5_10.3.i686.rpm     MD5: f46a18ae1a1468142740db219af7852aSHA-256: aa41f7231300018d1dc20177cdf24972d2538702bc4a507dcbd8d39c4ff01473 openssl-debuginfo-0.9.8e-27.el5_10.3.i386.rpm     MD5: 219511a848129df97c19c7a1776a4632SHA-256: 5557c93466eb664f5df30786672c4ea2fa58049f9b75a5b5f385b804037fd5b2 openssl-debuginfo-0.9.8e-27.el5_10.3.i686.rpm     MD5: 16ed56fcfa4300737234603d60035b10SHA-256: b5a59aab694219f927264379ada64e0d77358e5605f28284aad757c6a756bb3d openssl-devel-0.9.8e-27.el5_10.3.i386.rpm     MD5: e1c5d23a5af189405f1c73ffc222c02aSHA-256: e79b6c231dea63b74084b51b93292cc69e766a424f35b01cd749a1c22a1d89f8 openssl-perl-0.9.8e-27.el5_10.3.i386.rpm     MD5: de3260310d0ffc8ede2abd2d97720bf0SHA-256: 9c4ff27857bbbfae01ccd46c9fb8048a3b1b8557ff6e1a3f7ac529b51f3f591a   IA-64: openssl-0.9.8e-27.el5_10.3.i686.rpm     MD5: f46a18ae1a1468142740db219af7852aSHA-256: aa41f7231300018d1dc20177cdf24972d2538702bc4a507dcbd8d39c4ff01473 openssl-0.9.8e-27.el5_10.3.ia64.rpm     MD5: 56a27f8a881a7e16aad744fd1d428e49SHA-256: 57fbd1e9719798cfe2ed99b32342193393e675a975a2990e769ea3cd257ae866 openssl-debuginfo-0.9.8e-27.el5_10.3.i686.rpm     MD5: 16ed56fcfa4300737234603d60035b10SHA-256: b5a59aab694219f927264379ada64e0d77358e5605f28284aad757c6a756bb3d openssl-debuginfo-0.9.8e-27.el5_10.3.ia64.rpm     MD5: 7df1856d15b2d04af34935e9cb6f26c3SHA-256: 642cf6fa44dcbbba7b3d9d7c082083e21439bb207b49b8eea9a5ec4eeb19d820 openssl-devel-0.9.8e-27.el5_10.3.ia64.rpm     MD5: 4fc776afbd08d9a8b07457c2ba4dbbb9SHA-256: 20c968687cf356b7ed2db0c367acf7d68aa6505c717ee89ceb5574fe82a8956c openssl-perl-0.9.8e-27.el5_10.3.ia64.rpm     MD5: b3e43be72af146446817fdfea6c4f10cSHA-256: e864e873cd014fbb92e99a684a3fe57685c688bef56cfe91adec1edeb110d1cd   PPC: openssl-0.9.8e-27.el5_10.3.ppc.rpm     MD5: 23b892eae21357f89559ec67eb8f7901SHA-256: 6443e29bd010d48ee74c0a6651c8454e526f250cc76f8c257969b9e5d939a6a6 openssl-0.9.8e-27.el5_10.3.ppc64.rpm     MD5: 311dfd7a1946087eb305a079d582f5a8SHA-256: 4f3ffcb84f146b51ca89b001360998f55bdb12886aed31a68c7ab6072dc57b2e openssl-debuginfo-0.9.8e-27.el5_10.3.ppc.rpm     MD5: addab05720318d9ee0e562b24718a27bSHA-256: ec5a3f9b8f20064dd0cc6b24b3cec03fb47d1b3f5f295452e780208d88f2ba67 openssl-debuginfo-0.9.8e-27.el5_10.3.ppc64.rpm     MD5: 115b4d3b09e03e68b4be9268fa9dc3afSHA-256: 9bbcf321c45bea3bb6f12523aa0f6075a96b3ac8c0a093bc7fb6927186cbaded openssl-devel-0.9.8e-27.el5_10.3.ppc.rpm     MD5: 3a6619532a84daab9a5519911afd0606SHA-256: 0ad0d4b8e82e49d5e11803ae567758de7cdd04e9832541b6092a157b2a7eb2ee openssl-devel-0.9.8e-27.el5_10.3.ppc64.rpm     MD5: 55c30b58f4fe5b003babb08b841933e7SHA-256: 02b5fae0fb803e9837fa875eb4d3006b1835d1bdc6d03f43f79b8555d7c239db openssl-perl-0.9.8e-27.el5_10.3.ppc.rpm     MD5: 66f1f1e0ceac44caa33e81c5adc8eff2SHA-256: 2c9219c456d97b1ea58e4a84dff15af3b251a03c95f3613e49a03b397ad48046   s390x: openssl-0.9.8e-27.el5_10.3.s390.rpm     MD5: 7038bebd12722c73f2c5764fc5e10f48SHA-256: 772ab8eb8bb0dafb96f391a8fed72dff2462c44becc4009b3b9593c6c662e4c3 openssl-0.9.8e-27.el5_10.3.s390x.rpm     MD5: 2cefb544e2a661b952aeecd811888991SHA-256: 641df4f028c1facb02592bc26ebcad91c8d41007e7b6df738d1c9cd452f8d2b9 openssl-debuginfo-0.9.8e-27.el5_10.3.s390.rpm     MD5: 1f67079f1033ae2e43a48299a1ea079cSHA-256: ba651bb892251f790c1f6667f1c61d668b25c932e0f2c07ccb43a2255ffe01d0 openssl-debuginfo-0.9.8e-27.el5_10.3.s390x.rpm     MD5: 8bf2e20552832efed8469f88d537fa3fSHA-256: 64178f93589e28d35862f931e95841416c837b10fd0c3780e4b9947977c62468 openssl-devel-0.9.8e-27.el5_10.3.s390.rpm     MD5: 095548c96eda1dca52534d73eaf680daSHA-256: b8b7f9f6bbaee2d85394161011ac990cd6b97f8155597b79db3aff6cc0abbf22 openssl-devel-0.9.8e-27.el5_10.3.s390x.rpm     MD5: c41c4ae442edc536203f7283dd3f7e25SHA-256: 051c12dc43f2109b994ab0b1d05100e6a3055a01dd679e00abca5295208e5aeb openssl-perl-0.9.8e-27.el5_10.3.s390x.rpm     MD5: f86d7cd656c78321c02993847fa5c8c3SHA-256: 08dbf8f26d4bc9fd378ff65197e7854111adff1090d42ecfa41c7d742f69da92   x86_64: openssl-0.9.8e-27.el5_10.3.i686.rpm     MD5: f46a18ae1a1468142740db219af7852aSHA-256: aa41f7231300018d1dc20177cdf24972d2538702bc4a507dcbd8d39c4ff01473 openssl-0.9.8e-27.el5_10.3.x86_64.rpm     MD5: 3f802f7f32bc24f1cc046be0abd2d489SHA-256: 8e682abc76be09e396a2cb8419968dd0e2041179e8536cf39f3c4e010df2464a openssl-debuginfo-0.9.8e-27.el5_10.3.i386.rpm     MD5: 219511a848129df97c19c7a1776a4632SHA-256: 5557c93466eb664f5df30786672c4ea2fa58049f9b75a5b5f385b804037fd5b2 openssl-debuginfo-0.9.8e-27.el5_10.3.i686.rpm     MD5: 16ed56fcfa4300737234603d60035b10SHA-256: b5a59aab694219f927264379ada64e0d77358e5605f28284aad757c6a756bb3d openssl-debuginfo-0.9.8e-27.el5_10.3.x86_64.rpm     MD5: 7c7f6a1473e4f02134e186b9c5ff2d81SHA-256: e0b53c1abc5bedfaca569291aa92017d9bdfe85fcbd3c0fa9b332e7fcd63ab6b openssl-devel-0.9.8e-27.el5_10.3.i386.rpm     MD5: e1c5d23a5af189405f1c73ffc222c02aSHA-256: e79b6c231dea63b74084b51b93292cc69e766a424f35b01cd749a1c22a1d89f8 openssl-devel-0.9.8e-27.el5_10.3.x86_64.rpm     MD5: 7ed5f4c752493a1e230963eec7526807SHA-256: 6f59ac1d818133b4a7d6da5c4a0a1e7bb0b6eec9048035668005427fa184c2f8 openssl-perl-0.9.8e-27.el5_10.3.x86_64.rpm     MD5: dbdfed5b35961c43189ce1b48c106d42SHA-256: ff5baf013c47a8d26fae9855aa48507b284aa583fdcf640d4975531775424c42   Red Hat Enterprise Linux Desktop (v. 5 client) SRPMS: openssl-0.9.8e-27.el5_10.3.src.rpm     MD5: 3272e3435050704fe38bccafd897bd48SHA-256: 91a8b5889c3c534053fbad42bbda404b15258432639053e9192ca41eef12fead   IA-32: openssl-0.9.8e-27.el5_10.3.i386.rpm     MD5: 26fd9466593fbbf38e3704add559ecf7SHA-256: 8cb59d50a7dbfa0653c9b7b7f84225432ba851840188d78a7a221878ecb35adb openssl-0.9.8e-27.el5_10.3.i686.rpm     MD5: f46a18ae1a1468142740db219af7852aSHA-256: aa41f7231300018d1dc20177cdf24972d2538702bc4a507dcbd8d39c4ff01473 openssl-debuginfo-0.9.8e-27.el5_10.3.i386.rpm     MD5: 219511a848129df97c19c7a1776a4632SHA-256: 5557c93466eb664f5df30786672c4ea2fa58049f9b75a5b5f385b804037fd5b2 openssl-debuginfo-0.9.8e-27.el5_10.3.i686.rpm     MD5: 16ed56fcfa4300737234603d60035b10SHA-256: b5a59aab694219f927264379ada64e0d77358e5605f28284aad757c6a756bb3d openssl-perl-0.9.8e-27.el5_10.3.i386.rpm     MD5: de3260310d0ffc8ede2abd2d97720bf0SHA-256: 9c4ff27857bbbfae01ccd46c9fb8048a3b1b8557ff6e1a3f7ac529b51f3f591a   x86_64: openssl-0.9.8e-27.el5_10.3.i686.rpm     MD5: f46a18ae1a1468142740db219af7852aSHA-256: aa41f7231300018d1dc20177cdf24972d2538702bc4a507dcbd8d39c4ff01473 openssl-0.9.8e-27.el5_10.3.x86_64.rpm     MD5: 3f802f7f32bc24f1cc046be0abd2d489SHA-256: 8e682abc76be09e396a2cb8419968dd0e2041179e8536cf39f3c4e010df2464a openssl-debuginfo-0.9.8e-27.el5_10.3.i686.rpm     MD5: 16ed56fcfa4300737234603d60035b10SHA-256: b5a59aab694219f927264379ada64e0d77358e5605f28284aad757c6a756bb3d openssl-debuginfo-0.9.8e-27.el5_10.3.x86_64.rpm     MD5: 7c7f6a1473e4f02134e186b9c5ff2d81SHA-256: e0b53c1abc5bedfaca569291aa92017d9bdfe85fcbd3c0fa9b332e7fcd63ab6b openssl-perl-0.9.8e-27.el5_10.3.x86_64.rpm     MD5: dbdfed5b35961c43189ce1b48c106d42SHA-256: ff5baf013c47a8d26fae9855aa48507b284aa583fdcf640d4975531775424c42   (The unlinked packages above are only available from the Red Hat Network) 1103586 - CVE-2014-0224 openssl: SSL/TLS MITM vulnerability These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2014:0618-1: php54 bug fix and enhancement update

Updated php54 packages that fix several bugs and add various enhancements arenow available for Red Hat Software Collections 1.1 for Red Hat Enterprise Linux. PHP is an HTML-embedded scripting language commonly used with the Apache HTTPServer. The php54 packages provide a recent stable release of PHP with PEAR1.9.4, APC 3.1.15 and memcache 3.0.8 PECL extensions, and a number of additionalutilities.The php54 packages have been upgraded to a later version that is required by RedHat Software Collections 1.1, which provides a number of bug fixes andenhancements over the previous version.This update also fixes the following bugs:* Prior to this update, the "PHP_INI_SCAN_DIR" environment variable could onlybe set to a single directory name. As a consequence, a Software Collectiondependent on the php54 collection was unable to use an additional directory forconfiguration files. With this update, PHP has been patched to allow multipledirectory names in the "PHP_INI_SCAN_DIR" environment variable as acolon-separated list and a dependent Software Collection is now able to usemultiple configuration directories. (BZ#1058162)* Previously, when both Alternative PHP Cache (APC) and Zend OPcache wereenabled, a conflict could occur in the handling of "interned" strings betweenthe APC and OPcache extensions. Consequently, the PHP interpreter couldterminate unexpectedly with a segmentation fault. With this update, the APCextension no longer handles "interned" strings in the default configuration andthe APC and OPcache can be enabled together concurrently without any negativeconsequences. (BZ#1052178)In addition, this update adds the following enhancement:* Zend OPCache, an opcode cache, is now provided for PHP. Zend OPCache cachespre-compiled PHP code in memory, and thus improves performance of web sitesrunning PHP applications. (BZ#1032929)Users of php54 are advised to upgrade to these updated packages, which fix thesebugs and add these enhancements. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Software Collections 1 for RHEL 6 SRPMS: php54-1.1-5.el6.src.rpm     MD5: da34bcf23be369c5156544baf4fa8da4SHA-256: 7ef6458a11c01855ddf269877af19aac2cb83c701060ad4743268e214b1095c1 php54-php-5.4.16-16.el6.src.rpm     MD5: 99d8030214473847dd76427ce70df724SHA-256: d029490ccb4b315173d1c38b26c7b12ada15b6c94af8bc6aab89a5be722268b4 php54-php-pear-1.9.4-10.el6.src.rpm     MD5: c66bb10194caf0eacb828c855a71c9faSHA-256: 744a28ce961512f6345bf5558f55ba6678731f965c31e30bcac7cb88e76923c3 php54-php-pecl-apc-3.1.15-0.4.20130912.el6.src.rpm     MD5: 1ac072fd6b9f104bc3e05036df2dc191SHA-256: fa4485188a05523840fafdfb466a708dc18a722cf3ba562ef0cd8848f33c6ad9 php54-php-pecl-memcache-3.0.8-3.el6.src.rpm     MD5: af4da99100f2b8114d8dc2ec8243c372SHA-256: 65eec0e08ed22793a0c82abdfc5eb77bfadd615c3e5ebb42f7275b7c07152cb2 php54-php-pecl-zendopcache-7.0.2-4.el6.src.rpm     MD5: c6cad82f511306dbc20f6765255a5576SHA-256: 99c20dee746fa7cf4a6d0f7002a4733e74d48385b5456fca40ec07af0a613233   x86_64: php54-1.1-5.el6.x86_64.rpm     MD5: a4ca9213523cb7bb68f2518cf1d7cdd1SHA-256: 99b7622e86aa8cca0ba5b21cd725ca611f63ce11426d290546d4afa03d1c7475 php54-apc-panel-3.1.15-0.4.20130912.el6.noarch.rpm     MD5: b6e393439c44c93149f93d3fd32d2cf5SHA-256: d7c135841c55a65de81a2b5dea327e90db6018de46fadca864eced515f466f74 php54-php-5.4.16-16.el6.x86_64.rpm     MD5: bc9b12d12facc16f7afbe083e5017998SHA-256: 8fda6ed93095d07deb426e50dd5e9065ae2968d04cc630528878e3015857aadb php54-php-bcmath-5.4.16-16.el6.x86_64.rpm     MD5: bb11be77362761c4283f9a3c4addf54bSHA-256: 01b31e6edb705e541897dedd1d09370153ce944e9f4d5aa3024fe1b54a3ea35d php54-php-cli-5.4.16-16.el6.x86_64.rpm     MD5: a2624bc087ea9bbaf558676fc3362d49SHA-256: af6d87b76ddc7bbc2285b96f2394946db856d579d422a9f3d92a7062b9b0a41f php54-php-common-5.4.16-16.el6.x86_64.rpm     MD5: f005a1b428bd463d8bbb74cdb7e4a1daSHA-256: f28bd2d92ba384fd9d4e5423df223f452c30bc2949c96b1020a8bd726fa8892b php54-php-dba-5.4.16-16.el6.x86_64.rpm     MD5: bbccd5d9836be86742f6712d28ff6378SHA-256: 0c3b6af5d8dac3918e7a8d5464a460173e4fc3892d44853014d49a44cccf04b2 php54-php-debuginfo-5.4.16-16.el6.x86_64.rpm     MD5: b517e0454333dd25679a505505f7a71dSHA-256: 7c10a81907f17eceb10a5c02b94ea6366a746bdee003c96e564a5024c5e6205d php54-php-devel-5.4.16-16.el6.x86_64.rpm     MD5: 9ddac9a86284fa7246310cc8277e29c9SHA-256: fffc9d8d7eae3bb3cab348073b459278fc6ddc661eba88056fc8505aa53c466f php54-php-enchant-5.4.16-16.el6.x86_64.rpm     MD5: cc698b10b973d2bfa3cb1c6a2f53d198SHA-256: 1076282688258419fb41d3d271aab6e0aa45eeb5c11f3b19c197c9b391f43d2a php54-php-fpm-5.4.16-16.el6.x86_64.rpm     MD5: fb61d84de01e316e2de6ba79ee0c2d1cSHA-256: 809ead6507c63caad18c13f56fff616932aaa69a091d1d96b0dea4a78ede080c php54-php-gd-5.4.16-16.el6.x86_64.rpm     MD5: 2e7ef6beb5f246a8fcac4c1478a1f999SHA-256: 4e99f41b161e24754f03ce030aedc5863a020379a03e311d0a9280f8641a8e09 php54-php-imap-5.4.16-16.el6.x86_64.rpm     MD5: deb48359b169e731054c874c95d51edbSHA-256: fb96f79b83d892e404cadf4174f124841de5699fed2f4c80d123ac207d67c1cd php54-php-intl-5.4.16-16.el6.x86_64.rpm     MD5: 1750b7ad89b163efbebc6b6e64c78acaSHA-256: 7448431807a14222537a6eb6cd15c8bdf22b6caaf87939c01267fd902f564be7 php54-php-ldap-5.4.16-16.el6.x86_64.rpm     MD5: d479e43acbace4ba591ce3e1ab133b72SHA-256: b9a79d0101dd7465318a0f38658c638be2014c7e900e8c8169f40de2e4cae144 php54-php-mbstring-5.4.16-16.el6.x86_64.rpm     MD5: 29f16c7d9d81ee552ade4a9e4db58140SHA-256: 099d4f3a419007ff82f43d3ee3f9770dafec38abf9e622697e818bb35250ab9a php54-php-mysqlnd-5.4.16-16.el6.x86_64.rpm     MD5: 7770431888948cb3110eaeb4aa547285SHA-256: 4ce8c194287c19458af346dc9a0435f8bff4fabb1a6bf8c68f7fa89df1afc605 php54-php-odbc-5.4.16-16.el6.x86_64.rpm     MD5: 97536b29c43994d2ae96c36e8864ed9cSHA-256: 170d4e787067231f3491e48a47241f1550f6b1f7474543274f7e0235438b1153 php54-php-pdo-5.4.16-16.el6.x86_64.rpm     MD5: 0e936ea318b06a76894026ed78f51e91SHA-256: 1f9bc06dd60ee95bab442793404178f24d0c53803f5a5b52b09ce5cbae1abc33 php54-php-pear-1.9.4-10.el6.noarch.rpm     MD5: b2c9c7b465dafc00ffc351065a23254cSHA-256: afcfcb28059fbbc0b3db57cfb2be25df1c61aa5acd045bb4ce6d4aad99982c89 php54-php-pecl-apc-3.1.15-0.4.20130912.el6.x86_64.rpm     MD5: 8f8f3ad4f3ca7e18e8d1183a9ff09878SHA-256: 815c8df8b0e78f8c2e1ecc24e284fbf75bdd2768d6fa0ca3bd7b30bd4ae64e7b php54-php-pecl-apc-debuginfo-3.1.15-0.4.20130912.el6.x86_64.rpm     MD5: dd2f8efc67d7c46c0fb80bf92192cc09SHA-256: 11ac6d74deefcee1ebbf64f931451689205542cbc19d4ec455c45814a00cf728 php54-php-pecl-apc-devel-3.1.15-0.4.20130912.el6.x86_64.rpm     MD5: edc7e9095adca4ab972ae48365fd2baaSHA-256: ae3f866880623b6d47787e12a0ba5a028c967494d1c644f6a40f1351df5db8d0 php54-php-pecl-memcache-3.0.8-3.el6.x86_64.rpm     MD5: d94c7d01771f1ec4530763a9b9ea3cebSHA-256: 769c25186d25a935fc3377aec7b3e08c9f8bd03d1080ffa68708f71bce8f02a3 php54-php-pecl-memcache-debuginfo-3.0.8-3.el6.x86_64.rpm     MD5: 70872ab5f33aa7e3d63996f1af3a5c17SHA-256: a9277441b9b2fd43ee111afc179993e1a896529c70afad680622b7f707c3d841 php54-php-pecl-zendopcache-7.0.2-4.el6.x86_64.rpm     MD5: f2b600a91a1d23495ac0100c9571fd30SHA-256: 0f3c8e0df97a5626d594c9efe1b6e5a8bfebebea77c5c3c5208fefcd41fa91e6 php54-php-pecl-zendopcache-debuginfo-7.0.2-4.el6.x86_64.rpm     MD5: f31af517cae00243369cf77cb49b3595SHA-256: 5d17626b0daefe7da5c752896ffb97c0663d8d9a342bd23307342bf6a6d7c506 php54-php-pgsql-5.4.16-16.el6.x86_64.rpm     MD5: c79b71606794a0e36aedcfb7d8b4c2ecSHA-256: 2b837260c0b00308c30a6a12de749cc576fb923b8ebf7c4046a069b57dc71905 php54-php-process-5.4.16-16.el6.x86_64.rpm     MD5: c88bea32081d0e7605895a720540eac4SHA-256: 469688e76cc2d1288c2112b6a0005608b762abac1e7771dd26378f36fd2d81bd php54-php-pspell-5.4.16-16.el6.x86_64.rpm     MD5: 40a9caa956b71ddb765482c0d13024edSHA-256: 66b795c691fd975f9eb05dacfb111b00465ec608b577a677da0f622988a67762 php54-php-recode-5.4.16-16.el6.x86_64.rpm     MD5: 8d0df8080009f193129ea39e225d8cefSHA-256: 1c38875cfe74ed60762b53b6cc2900c01fd10e7426892e56ee2c657c24db5775 php54-php-snmp-5.4.16-16.el6.x86_64.rpm     MD5: c9518762e219f881f504811290d97c8bSHA-256: c7e1abcf664073e2316a9d055ed74b720e3a11f5ab7d9bc7615c6d11f9a506ba php54-php-soap-5.4.16-16.el6.x86_64.rpm     MD5: 820d07406c9c00a2aaf3b74583e4bafaSHA-256: 498a5c8afaf6be9a154a5b26e3ad43a1cde26034183c4d0878a98a4f071fbc0b php54-php-tidy-5.4.16-16.el6.x86_64.rpm     MD5: 4448de02040c8338a87b8f81c463b660SHA-256: 0edc1b8106023d0b08975c067a750bd347e95d3a299fb5c5c3f60b7bce57750d php54-php-xml-5.4.16-16.el6.x86_64.rpm     MD5: 2fef38d08f399d73637011e8ee9f9647SHA-256: 0c406f3eff883dcb3a38f6d5a2d3ea7ab21d152f5f96147b8b594c453a9246ae php54-php-xmlrpc-5.4.16-16.el6.x86_64.rpm     MD5: 1c48e59a208ebaba5e7e3cfbec155acaSHA-256: 38cb8686352fe6c4c3dca9bf9234eefa741e43c85c1370053d342ee1f597b9a0 php54-runtime-1.1-5.el6.x86_64.rpm     MD5: 95920b75f102f3edb940a92e00cd249bSHA-256: 04a2f8fe3d844b15296c0f91e380d126c03de6ba2e6085880aea50703c2c244d php54-scldevel-1.1-5.el6.x86_64.rpm     MD5: f45aac853fae9906b893dea9ececd4eaSHA-256: 6c436370888e18b18c6f923c2e74318b3ca5c00c3f33906308620318da110c01   (The unlinked packages above are only available from the Red Hat Network) 1008483 - depending collections do not point into correct directory1008846 - depending collections do not point into correct directory1058162 - Allow multiple paths in php_ini_scan_path1058636 - Unexpanded macro These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2014:0616-1: postgresql92 bug fix update

Updated postgresql92 packages that fix several bugs are now available for RedHat Software Collections 1.1 for Red Hat Enterprise Linux. PostgreSQL is an advanced object-relational database management system (DBMS).The postgresql92 packages have been upgraded to upstream version 9.2.8, whichprovides a number of bug fixes over the previous version. (BZ#1079994)This update also fixes the following bug:* Previously, not all files in an RPM package were correctly owned by thecorresponding collection. As a consequence, when the postgresql92 collection wasremoved, some files remained in the /opt/rh/postgresql92/root/ directory. Withthis update, all files in the postgresql92 collection are owned properly and noredundant files are left after the collection is removed. (BZ#1079968)Users of postgresql92 are advised to upgrade to these updated packages, whichfix these bugs. Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Software Collections 1 for RHEL 6 SRPMS: postgresql92-1.1-20.el6.src.rpm     MD5: 479f5c6232f9f36b716b54841438a16dSHA-256: ea326d0b3df1ba3a641994ea14d2cbfc3096519058a25fad84613e7c0a0938a1 postgresql92-postgresql-9.2.8-1.el6.src.rpm     MD5: 2cd0a856ca0236785226a54f81a01230SHA-256: 65432a1ae309a03c10930a32ffc6e1dd844089994de4a97e0d35d45b85589ac4   x86_64: postgresql92-1.1-20.el6.x86_64.rpm     MD5: ee4c33c372eb2704866aebcd6164cd89SHA-256: 976bb830857c6850be6320adff07b0a0a96e21717f86a5e1f49fd113a722f268 postgresql92-postgresql-9.2.8-1.el6.x86_64.rpm     MD5: e8ecfa734b7905d8adbdc4b6a2da6502SHA-256: 83e359cc9a635e01e946d1170ea72caa1aa3425c9af6a3f18fae78a57e8aee8b postgresql92-postgresql-contrib-9.2.8-1.el6.x86_64.rpm     MD5: 08696e0ecd75c1a182605a1ec29c8a01SHA-256: ea6458362f09e62151f1fbf50069552aee1ae34c80015e0b98b4cf18cce530d9 postgresql92-postgresql-debuginfo-9.2.8-1.el6.x86_64.rpm     MD5: e592a6bf8ea71cd1d09984ea1b366683SHA-256: b0f4b350dee9363a25e8fab9fa7f1a922df94dbe1b300c411dc20e6f747e2480 postgresql92-postgresql-devel-9.2.8-1.el6.x86_64.rpm     MD5: 1c7a202d0493b25d27dbf75ec8b5a317SHA-256: c1c8775e6c50cbc208bcf1905853b29aa1c1ac6c6a4f74e4ad05d62dc870d343 postgresql92-postgresql-docs-9.2.8-1.el6.x86_64.rpm     MD5: c68596eeed6f438d1b3936b434221134SHA-256: eaa20043b2dfe7458020be6dd2f85254b574a92043db3b9327ec2401c9ce3433 postgresql92-postgresql-libs-9.2.8-1.el6.x86_64.rpm     MD5: 5dbd87ca6be29361a9372a2c34dfd8a8SHA-256: 5f0cddfdd5c116c1adb965dab1aeb91cc8b465f7ff05adb8527602c098d97178 postgresql92-postgresql-plperl-9.2.8-1.el6.x86_64.rpm     MD5: 9cfa9cb11ebfdff1496e93fc9806f807SHA-256: 3310f5247529217b4fd2d8ae28880c709f9dba7fca12108e8b654f1dbe1e8d9b postgresql92-postgresql-plpython-9.2.8-1.el6.x86_64.rpm     MD5: d64e21fe4a5edce88c4110aebcb871b1SHA-256: 4db76d01ce0b586e99cf1e26db578459d0c38497c93efb3ad44a268ad5af10cf postgresql92-postgresql-pltcl-9.2.8-1.el6.x86_64.rpm     MD5: 1e4d2a868da59ba6f74df57dcd35f6a9SHA-256: 73698b835b51813b08dd9a3ba6097b7925dcf86b9e582467114f1c2e68fa7b14 postgresql92-postgresql-server-9.2.8-1.el6.x86_64.rpm     MD5: 17403a6d21537a520eef332d6d577e84SHA-256: 709f48f57bf0030c82cf43d8711f5d1a9c717701b8ac13063059c66fc657d41c postgresql92-postgresql-test-9.2.8-1.el6.x86_64.rpm     MD5: 13cd786daf807e51ca7b42cfccd105dbSHA-256: d8bcfd01eda1abaecbd888220123bb9e096197bda24285da64b6b16d99252d9e postgresql92-postgresql-upgrade-9.2.8-1.el6.x86_64.rpm     MD5: b28b1d265fe49bb3cd0d0eb1e2bcb60dSHA-256: 38b5462afddf2dca0e25f86a914a3a02be3ded5a78c6757e029c1a8e6f89e111 postgresql92-runtime-1.1-20.el6.x86_64.rpm     MD5: 7370e37aad5208a001809e876d13c18fSHA-256: 5d1270c79921918d56817624814c97fe8db10d51ed5f8aed911dd6bf38c281d1 postgresql92-scldevel-1.1-20.el6.x86_64.rpm     MD5: 57359f12cabab89f6346148df2785f73SHA-256: 3860bf3e3291d82c5d63833e1800aa757bf8f9226144e71f1d88d411c9327899   (The unlinked packages above are only available from the Red Hat Network) 1009365 - incorrect PGDATA path in /opt/rh/postgresql92/root/var/lib/pgsql/.bash_profile1060767 - legacy action scripts initdb and upgrade should use scl environment settings1061456 - postgresql92 meta package should include LICENSE, README and postgresql92 man page files1079994 - rebase postgresql to 9.2.8 These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

RHBA-2014:0614-1: mariadb55 bug fix and enhancement update

Updated mariadb55 packages that fix several bugs are now available for Red HatSoftware Collections 1.1 for Red Hat Enterprise Linux. MariaDB is a multi-user, multi-threaded SQL database server that isbinary-compatible with MySQL.The mariadb55 packages have been upgraded to upstream version 5.5.36, whichprovides a number of bug fixes and enhancements over the previous version.(BZ#1023010)This update also fixes the following bugs:* Prior to this update, the MySQL server attempted to verify if the MySQL socketexisted, but did not take into consideration whether any processes were usingit. As a consequence, if the MySQL server terminated unexpectedly, the MySQLsocket was not reset after the reboot, and thus prevented the MySQL server fromrestarting correctly. With this update, the MySQL server no longer attempts toverify the existence of a MySQL socket when the socket is not being used by anyprocesses. As a result, the MySQL server can now be successfully restarted aftera crash occurs. (BZ#1037748)* Previously, not all files in an RPM package were correctly owned by thecorresponding collection. As a consequence, when the mariadb55 SoftwareCollection was removed, some files remained in the /opt/rh/mariadb55/root/directory. With this update, all files in the mariadb55 collection are ownedproperly and no redundant files are left after the collection is removed.(BZ#1079913)In addition, this update adds the following enhancement:* The Pluggable Authentication Modules (PAM) plug-in has been added to themariadb55 Software Collection. PAM allows a system to set up authenticationpolicies without the need to recompile programs to handle authentication. Theplug-in also includes a number of authentication features, such as enforcingpassword expiration. (BZ#1019868)Users of mariadb55 are advised to upgrade to these updated packages, which fixthese bugs and add these enhancements. Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Software Collections 1 for RHEL 6 SRPMS: mariadb55-1.1-17.el6.src.rpm     MD5: a032adfdbf0e9bbf597aa408c13d634dSHA-256: 58f114d0b4a82d46cf6ad0f3f525849a26f560b6800404aecda6254943603a22 mariadb55-mariadb-5.5.37-9.el6.src.rpm     MD5: 72dad5dfaf56ca25b4920f70c3d03074SHA-256: 404d263261ca4f5a52e22cfa994d29e21cee678de36481c65c5112faa07d8399   x86_64: mariadb55-1.1-17.el6.x86_64.rpm     MD5: 0e822aee78c3882a54434a01d30883aaSHA-256: 859699fc0e7f94750cf2ac9cb792912dbe227b55412aa2ea62d83222a876ac2a mariadb55-mariadb-5.5.37-9.el6.x86_64.rpm     MD5: e1bfa828c3f17c701d828e6ee0984bc2SHA-256: 29aeecc2caa462b80a492c791b85a6292af2604f81aa81efb70d9dc14cd37f12 mariadb55-mariadb-bench-5.5.37-9.el6.x86_64.rpm     MD5: 5696794fc126ddcce12f176094fd6575SHA-256: e92a2fd404fb5b2e2bc18e687ffc457a2f1d270ff4d8b53b21d130768ee67843 mariadb55-mariadb-debuginfo-5.5.37-9.el6.x86_64.rpm     MD5: d6e57128d8ed9269b97401509c67acd2SHA-256: 48981a1e5e8e29c2789e9a2ae413a117912b2dda07223d340180ae43e9ac2e99 mariadb55-mariadb-devel-5.5.37-9.el6.x86_64.rpm     MD5: 3a488aaaec2357cadf3e42ae922bf4a0SHA-256: 10262d82cbccecd48f7b00387404023352c6e677c112299b8303c6fbe7c8b6e6 mariadb55-mariadb-libs-5.5.37-9.el6.x86_64.rpm     MD5: f55d35d343ffbc850a96ff1ed8771138SHA-256: 43208213b56e5560ee8730090e78fbf80294583a2d5e8c8911da712b29032145 mariadb55-mariadb-server-5.5.37-9.el6.x86_64.rpm     MD5: 96f3bdf5a822dc5e34b0b282c14bcc49SHA-256: 485f4230f4e9a6d11255161027dd06808782ad177d1af2d130cd89146f1e0605 mariadb55-mariadb-test-5.5.37-9.el6.x86_64.rpm     MD5: 00d2747bcdb66b17cde542b63579bf8bSHA-256: 37fc407ad08e663eee8e6fb3a9dc7cf89b48742fc3d44d09082eca9a5f693502 mariadb55-runtime-1.1-17.el6.x86_64.rpm     MD5: 067a2f0ce0bda930ae32135f92ada2b4SHA-256: a72f9097809f9b1232340a19fcccdfeeadb4ee9e96ea13c7b7c15257646569e8 mariadb55-scldevel-1.1-17.el6.x86_64.rpm     MD5: e28fcf0c746399d0f6fa90a873a26a93SHA-256: 7cc482b19c003da13019e9b8b391c1a47d2de39ab47068d6cdeb824049249d09   (The unlinked packages above are only available from the Red Hat Network) 1019868 - [RFE] Please include PAM authentication plugin for MariaDB1025280 - mariadb55-mariadb-server installation error: cannot touch ‘/var/log/mariadb55-mariadb/mariadb.log’1042873 - Potential issues caused by non-namespaced RPM provides and libraries1053393 - Use policycoreutils-python in meta package1061444 - mariadb55 meta package should include LICENSE, README and mariadb55 man page files1072958 - systemctl restart mariadb55-mariadb behaves randomly1079973 - Man page has incorrect service name on rhel7 These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: