Risks
Advisories
Browse
or
or
CentOS Errata and Security Advisory - Moderate CentOS 5 ruby Update (CESA-2013:0129)
CentOS Errata and Security Advisory 2013:0129 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-0129.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
5bf5d7b23babdb2a192d466e575b88c71cdce510edbb24d7218aa101c4ad138e 
ruby-1.8.5-27.el5.i386.rpm
6ed2763e50f9d9bb603fcf52366bdd85b1092fe6598cf07c0cf1aaa1f7601cfe 
ruby-devel-1.8.5-27.el5.i386.rpm
d791de1a8ae27d3c1cff4a945693c098cd5a9dffc95477bff311e3b0de73fe8c 
ruby-docs-1.8.5-27.el5.i386.rpm
476bcf43b4899a43232051e724c5f2d3b5f51e0d618b59287e6aff1da7159e37 
ruby-irb-1.8.5-27.el5.i386.rpm
1a8f866296d01da2c1583062ab52578f0d6fc1c7c81009b13fac34b2bfe7c2a0 
ruby-libs-1.8.5-27.el5.i386.rpm
1ecfcacb9ce4bdfc2ce6cc29fd6b19b75dfcad764d2a3017487a65bcc641bd14 
ruby-mode-1.8.5-27.el5.i386.rpm
9475dc0ba57ba12ddc900987feb14749235046f45726a80cec8c725fbea6439a 
ruby-rdoc-1.8.5-27.el5.i386.rpm
cb0b6dbc47d8f2652a44aef2a88a1a8461759fbbb1ce16d2188dbe3c9bb65fc3 
ruby-ri-1.8.5-27.el5.i386.rpm
733fece3eb5c6257e02d5090388b9c01370f63a6c3a5d4de8429ccbffceca6ad 
ruby-tcltk-1.8.5-27.el5.i386.rpm

x86_64:
bd7554906576dfd7c3955b739c7ea1d9dfd527c8620b456d5fea3c08d9620e48 
ruby-1.8.5-27.el5.x86_64.rpm
6ed2763e50f9d9bb603fcf52366bdd85b1092fe6598cf07c0cf1aaa1f7601cfe 
ruby-devel-1.8.5-27.el5.i386.rpm
ea993d1c2df7560d94164f8ae3bb111ba63793b88918f156114c3116c484d99f 
ruby-devel-1.8.5-27.el5.x86_64.rpm
56343e2c957b87327d6eae6decd39b42c67e2359f888d2f21cb9a9126ce0f8c8 
ruby-docs-1.8.5-27.el5.x86_64.rpm
5b8a681181004b066125a31acc66ee1fe481f576dffe462105ed4b923733fdbf 
ruby-irb-1.8.5-27.el5.x86_64.rpm
1a8f866296d01da2c1583062ab52578f0d6fc1c7c81009b13fac34b2bfe7c2a0 
ruby-libs-1.8.5-27.el5.i386.rpm
105e86da382ed3f1b6b09e79fd43149d5b74176134a2fb43a17238882a27f1dc 
ruby-libs-1.8.5-27.el5.x86_64.rpm
a1de27e085b08a67ea2b2b857a00b0cccf23e0a7473397ba295b20f53426ae2b 
ruby-mode-1.8.5-27.el5.x86_64.rpm
f31fb3ad2ed8e8b2af949e1d26880a8a3ab8147a9432164508ae576354979386 
ruby-rdoc-1.8.5-27.el5.x86_64.rpm
0e44e6adacdc066287b1888529372c3834c8c72f8db8d8c0bdb22937d4231765 
ruby-ri-1.8.5-27.el5.x86_64.rpm
0d498760b89e1abc07e5a933584d03cc27abdafd0b55fa8c07527d9478939e46 
ruby-tcltk-1.8.5-27.el5.x86_64.rpm

Source:
987a885a0acb74f365076e5f609371b9822ead936081407d4ecc597dc855e9cb 
ruby-1.8.5-27.el5.src.rpm




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //