Risks
Advisories
Browse
or
or
CentOS Errata and Security Advisory - Moderate CentOS 5 ruby Update (CESA-2013:0129)
CentOS Errata and Security Advisory 2013:0129 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-0129.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
5bf5d7b23babdb2a192d466e575b88c71cdce510edbb24d7218aa101c4ad138e 
ruby-1.8.5-27.el5.i386.rpm
6ed2763e50f9d9bb603fcf52366bdd85b1092fe6598cf07c0cf1aaa1f7601cfe 
ruby-devel-1.8.5-27.el5.i386.rpm
d791de1a8ae27d3c1cff4a945693c098cd5a9dffc95477bff311e3b0de73fe8c 
ruby-docs-1.8.5-27.el5.i386.rpm
476bcf43b4899a43232051e724c5f2d3b5f51e0d618b59287e6aff1da7159e37 
ruby-irb-1.8.5-27.el5.i386.rpm
1a8f866296d01da2c1583062ab52578f0d6fc1c7c81009b13fac34b2bfe7c2a0 
ruby-libs-1.8.5-27.el5.i386.rpm
1ecfcacb9ce4bdfc2ce6cc29fd6b19b75dfcad764d2a3017487a65bcc641bd14 
ruby-mode-1.8.5-27.el5.i386.rpm
9475dc0ba57ba12ddc900987feb14749235046f45726a80cec8c725fbea6439a 
ruby-rdoc-1.8.5-27.el5.i386.rpm
cb0b6dbc47d8f2652a44aef2a88a1a8461759fbbb1ce16d2188dbe3c9bb65fc3 
ruby-ri-1.8.5-27.el5.i386.rpm
733fece3eb5c6257e02d5090388b9c01370f63a6c3a5d4de8429ccbffceca6ad 
ruby-tcltk-1.8.5-27.el5.i386.rpm

x86_64:
bd7554906576dfd7c3955b739c7ea1d9dfd527c8620b456d5fea3c08d9620e48 
ruby-1.8.5-27.el5.x86_64.rpm
6ed2763e50f9d9bb603fcf52366bdd85b1092fe6598cf07c0cf1aaa1f7601cfe 
ruby-devel-1.8.5-27.el5.i386.rpm
ea993d1c2df7560d94164f8ae3bb111ba63793b88918f156114c3116c484d99f 
ruby-devel-1.8.5-27.el5.x86_64.rpm
56343e2c957b87327d6eae6decd39b42c67e2359f888d2f21cb9a9126ce0f8c8 
ruby-docs-1.8.5-27.el5.x86_64.rpm
5b8a681181004b066125a31acc66ee1fe481f576dffe462105ed4b923733fdbf 
ruby-irb-1.8.5-27.el5.x86_64.rpm
1a8f866296d01da2c1583062ab52578f0d6fc1c7c81009b13fac34b2bfe7c2a0 
ruby-libs-1.8.5-27.el5.i386.rpm
105e86da382ed3f1b6b09e79fd43149d5b74176134a2fb43a17238882a27f1dc 
ruby-libs-1.8.5-27.el5.x86_64.rpm
a1de27e085b08a67ea2b2b857a00b0cccf23e0a7473397ba295b20f53426ae2b 
ruby-mode-1.8.5-27.el5.x86_64.rpm
f31fb3ad2ed8e8b2af949e1d26880a8a3ab8147a9432164508ae576354979386 
ruby-rdoc-1.8.5-27.el5.x86_64.rpm
0e44e6adacdc066287b1888529372c3834c8c72f8db8d8c0bdb22937d4231765 
ruby-ri-1.8.5-27.el5.x86_64.rpm
0d498760b89e1abc07e5a933584d03cc27abdafd0b55fa8c07527d9478939e46 
ruby-tcltk-1.8.5-27.el5.x86_64.rpm

Source:
987a885a0acb74f365076e5f609371b9822ead936081407d4ecc597dc855e9cb 
ruby-1.8.5-27.el5.src.rpm




Spotlight

eBook: Cybersecurity for Dummies

Posted on 16 December 2014.  |  APTs have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cybercriminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Dec 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //