Risks
Advisories
Browse
or
or
CentOS Errata and Security Advisory - Critical CentOS 6 java-1.6.0-openjdk Update (CESA-2013:0245)
CentOS Errata and Security Advisory 2013:0245 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-0245.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
45f5be6d622ec6b61bc364bc41292cce3c039ce9a2f256547799549511b62b57 
java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm
673886fe410590d3fea0fc0bf737e270a7bc82618eb60afe5ef3a57c94ebe9ce 
java-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm
fd72d47ffc63a5e2d6d94c2f2dd26aac1347afd0a870ebd9981ed53913f18b78 
java-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm
4ac08deba71feb47af816827df483325008297430202ef0354c5a836072aba09 
java-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm
9897d66b2513933e274ae1b3ff8ab317fdb9d5ecab15d8a530c5f473d052ccd3 
java-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.i686.rpm

x86_64:
60ea2a97670f0a81bdbc9da0af472dc0da9759f52f822cfcf29d4fae3d83d6e6 
java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm
7feb530c1062d18ad241873deffe55b82d29c92fe396fe88fb58078234ebc5c4 
java-1.6.0-openjdk-demo-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm
e9ccd584414cf8a8fa16cd94ea7ba8de0fbb380757836b65622cddf5a90b4f21 
java-1.6.0-openjdk-devel-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm
f683052212ccfca6d58456da91791a5cf29e5b6efeab7e44aca2910839d29c9f 
java-1.6.0-openjdk-javadoc-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm
02b483d0a7ee0fdec4d17cdf32c3258b166a9adc0bb836d74394844eb013473c 
java-1.6.0-openjdk-src-1.6.0.0-1.54.1.11.6.el6_3.x86_64.rpm

Source:
e1182ab4c56913c637272df5e8b2a88a11a1dc52756ee79f3f6ac533934001bd 
java-1.6.0-openjdk-1.6.0.0-1.54.1.11.6.el6_3.src.rpm




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //