Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2016:0305 - Security Advisory
Issued:
2016-03-01
Updated:
2016-03-01

RHSA-2016:0305 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: openssl security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated openssl packages that fix two security issues are now available
for Red Hat Enterprise Linux 6.6 and 7.1 Extended Update Support.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL v2/v3)
and Transport Layer Security (TLS v1) protocols, as well as a
full-strength, general purpose cryptography library.

A padding oracle flaw was found in the Secure Sockets Layer version 2.0
(SSLv2) protocol. An attacker can potentially use this flaw to decrypt
RSA-encrypted cipher text from a connection using a newer SSL/TLS protocol
version, allowing them to decrypt such connections. This cross-protocol
attack is publicly referred to as DROWN. (CVE-2016-0800)

Note: This issue was addressed by disabling the SSLv2 protocol by default
when using the 'SSLv23' connection methods, and removing support for weak
SSLv2 cipher suites. For more information, refer to the knowledge base
article linked to in the References section.

A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2
ciphers that have been disabled on the server. This could result in weak
SSLv2 ciphers being used for SSLv2 connections, making them vulnerable to
man-in-the-middle attacks. (CVE-2015-3197)

Red Hat would like to thank the OpenSSL project for reporting these issues.
Upstream acknowledges Nimrod Aviram and Sebastian Schinzel as the original
reporters.

All openssl users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. For the update to take
effect, all services linked to the OpenSSL library must be restarted, or
the system rebooted.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.6 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.1 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.6 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.1 ppc64
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.6 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.6 i386
  • Red Hat Enterprise Linux EUS Compute Node 7.1 x86_64
  • Red Hat Enterprise Linux EUS Compute Node 6.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 6.6 x86_64
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.1 ppc64le
  • Red Hat Enterprise Linux Server - TUS 6.6 x86_64

Fixes

  • BZ - 1301846 - CVE-2015-3197 OpenSSL: SSLv2 doesn't block disabled ciphers
  • BZ - 1310593 - CVE-2016-0800 SSL/TLS: Cross-protocol attack on TLS using SSLv2 (DROWN)

CVEs

  • CVE-2016-0800
  • CVE-2015-3197

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/articles/2176731
  • https://drownattack.com/
  • https://openssl.org/news/secadv/20160128.txt
  • https://openssl.org/news/secadv/20160301.txt
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.1

SRPM
x86_64
openssl-1.0.1e-42.el7_1.10.x86_64.rpm SHA-256: 737b5a466095cfcb1ff5b174860e45b5b1169a1105a1bd710ae26d21fb50709d
openssl-debuginfo-1.0.1e-42.el7_1.10.i686.rpm SHA-256: 77c40b8898e238eec2ccc252c758e693d2d914231f6f33dbce3179f6127acaa4
openssl-debuginfo-1.0.1e-42.el7_1.10.i686.rpm SHA-256: 77c40b8898e238eec2ccc252c758e693d2d914231f6f33dbce3179f6127acaa4
openssl-debuginfo-1.0.1e-42.el7_1.10.x86_64.rpm SHA-256: 150f0a5de9283fcd5c54135d3d329f33c4a9870bef1f04987478a033ebf98c4a
openssl-debuginfo-1.0.1e-42.el7_1.10.x86_64.rpm SHA-256: 150f0a5de9283fcd5c54135d3d329f33c4a9870bef1f04987478a033ebf98c4a
openssl-devel-1.0.1e-42.el7_1.10.i686.rpm SHA-256: 73204f215c338878acde06c4ffaa90f298efa5a06ef4c004ca1aaa1509ed893f
openssl-devel-1.0.1e-42.el7_1.10.x86_64.rpm SHA-256: 66fa01844326511810a398e87e3fb8c92e59c391071a84732878168d9b4047c2
openssl-libs-1.0.1e-42.el7_1.10.i686.rpm SHA-256: faa1182a13b392111588b5f17b09984a1350a2b3be6db5a424e36ca5a9a0a699
openssl-libs-1.0.1e-42.el7_1.10.x86_64.rpm SHA-256: 29fd7eb611cf26f345f270ec8a1a177497dca924e0247e7d54f475ed978a60d3
openssl-perl-1.0.1e-42.el7_1.10.x86_64.rpm SHA-256: 12b1d61e64f5c1e13a63f7089475e0bc11cd3e974d9bc3c6e2734a353194fb5d
openssl-static-1.0.1e-42.el7_1.10.i686.rpm SHA-256: d2fd833e51ce2706f4b931caf43e5af781bb3ec55cdc84b287e760e6d9fca098
openssl-static-1.0.1e-42.el7_1.10.x86_64.rpm SHA-256: 97ab33b14031077a04a9e15ccfb4728a4ab606a3e88d47830036fcfe8ff74206

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.6

SRPM
openssl-1.0.1e-30.el6_6.12.src.rpm SHA-256: 05561a15daeefbff6cbf7f92a3c84d6e4c4ed2db71d5243aaf6f95c26fe9fc59
x86_64
openssl-1.0.1e-30.el6_6.12.i686.rpm SHA-256: 7a726af15d048863c5003b5c3cb73511e15e443916b58d57ec8118831daee039
openssl-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 624246cd921b2475733b959d964e47d0cbb3ca97f3393ca9951bab1059725af5
openssl-debuginfo-1.0.1e-30.el6_6.12.i686.rpm SHA-256: d7c9327fd3336c05c99ff1c8c12d9f4be9ed1a4a553f7e59e3b45d1ef5988352
openssl-debuginfo-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 04492235043c10d5c66931e7e2c0e2d5a515cb408a0dcc310cc67f01a5b3940d
openssl-debuginfo-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 04492235043c10d5c66931e7e2c0e2d5a515cb408a0dcc310cc67f01a5b3940d
openssl-devel-1.0.1e-30.el6_6.12.i686.rpm SHA-256: a879e253e4be6cd59ac29a811c4b35b8ad355e789973dad2792578a26b1a9cf9
openssl-devel-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 3720bc9743d9780fe81839b3ae51cf5145cd0f9952b5bdc172714a9c013e0d41
openssl-perl-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 08357b6696807ff01e4e838578c82b00781732c78788b776944c2446a5148eee
openssl-static-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 05e3fe04b918e484d250bdcee0ce1d0f3e82c6f1cc9dbe34f7019ba71436ccb7
i386
openssl-1.0.1e-30.el6_6.12.i686.rpm SHA-256: 7a726af15d048863c5003b5c3cb73511e15e443916b58d57ec8118831daee039
openssl-debuginfo-1.0.1e-30.el6_6.12.i686.rpm SHA-256: d7c9327fd3336c05c99ff1c8c12d9f4be9ed1a4a553f7e59e3b45d1ef5988352
openssl-debuginfo-1.0.1e-30.el6_6.12.i686.rpm SHA-256: d7c9327fd3336c05c99ff1c8c12d9f4be9ed1a4a553f7e59e3b45d1ef5988352
openssl-devel-1.0.1e-30.el6_6.12.i686.rpm SHA-256: a879e253e4be6cd59ac29a811c4b35b8ad355e789973dad2792578a26b1a9cf9
openssl-perl-1.0.1e-30.el6_6.12.i686.rpm SHA-256: 29c5109d1e5c9ff6a28c0990401fdbb6bdd0d4fa041f508425ada82755a155dd
openssl-static-1.0.1e-30.el6_6.12.i686.rpm SHA-256: 1d5ec88e30886840a103fb58cc1987300f9ceb469feb30b3df1eb7ede4b925cc

Red Hat Enterprise Linux Server - AUS 6.6

SRPM
openssl-1.0.1e-30.el6_6.12.src.rpm SHA-256: 05561a15daeefbff6cbf7f92a3c84d6e4c4ed2db71d5243aaf6f95c26fe9fc59
x86_64
openssl-1.0.1e-30.el6_6.12.i686.rpm SHA-256: 7a726af15d048863c5003b5c3cb73511e15e443916b58d57ec8118831daee039
openssl-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 624246cd921b2475733b959d964e47d0cbb3ca97f3393ca9951bab1059725af5
openssl-debuginfo-1.0.1e-30.el6_6.12.i686.rpm SHA-256: d7c9327fd3336c05c99ff1c8c12d9f4be9ed1a4a553f7e59e3b45d1ef5988352
openssl-debuginfo-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 04492235043c10d5c66931e7e2c0e2d5a515cb408a0dcc310cc67f01a5b3940d
openssl-debuginfo-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 04492235043c10d5c66931e7e2c0e2d5a515cb408a0dcc310cc67f01a5b3940d
openssl-devel-1.0.1e-30.el6_6.12.i686.rpm SHA-256: a879e253e4be6cd59ac29a811c4b35b8ad355e789973dad2792578a26b1a9cf9
openssl-devel-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 3720bc9743d9780fe81839b3ae51cf5145cd0f9952b5bdc172714a9c013e0d41
openssl-perl-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 08357b6696807ff01e4e838578c82b00781732c78788b776944c2446a5148eee
openssl-static-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 05e3fe04b918e484d250bdcee0ce1d0f3e82c6f1cc9dbe34f7019ba71436ccb7

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.1

SRPM
s390x
openssl-1.0.1e-42.el7_1.10.s390x.rpm SHA-256: cb9f9da07e8781fbd1d6d7482bbd3f889255bdb2460364569461df93cb79494a
openssl-debuginfo-1.0.1e-42.el7_1.10.s390.rpm SHA-256: aae17961440bbd3c4ff932240db74321b9ee1796817777ef4c44848019defdc6
openssl-debuginfo-1.0.1e-42.el7_1.10.s390.rpm SHA-256: aae17961440bbd3c4ff932240db74321b9ee1796817777ef4c44848019defdc6
openssl-debuginfo-1.0.1e-42.el7_1.10.s390x.rpm SHA-256: feab7876861ff8a4daef8012ca8ae7009e23a85f9056b8b260a2631c49576e89
openssl-debuginfo-1.0.1e-42.el7_1.10.s390x.rpm SHA-256: feab7876861ff8a4daef8012ca8ae7009e23a85f9056b8b260a2631c49576e89
openssl-devel-1.0.1e-42.el7_1.10.s390.rpm SHA-256: 4f4a106c79397e647be2bf55175c395d9d07520589b5c05fd2583458f5437eb4
openssl-devel-1.0.1e-42.el7_1.10.s390x.rpm SHA-256: ec95fa60044c0f732704de593bbc960683025619f70a6653476c59a48788cf0e
openssl-libs-1.0.1e-42.el7_1.10.s390.rpm SHA-256: 535467d57a36b84a6e85f9e597afb51304148c9bcb1da727ef8739d7940f475a
openssl-libs-1.0.1e-42.el7_1.10.s390x.rpm SHA-256: 67257b9312b471b95acff844eaf7b3dccb513bd7108eaa818e104d57d5793feb
openssl-perl-1.0.1e-42.el7_1.10.s390x.rpm SHA-256: ca350d2051e9e5eac3828c07917d59f060be483a07920c566e9c8f7aa2d48723
openssl-static-1.0.1e-42.el7_1.10.s390.rpm SHA-256: f194561c99a60050359c616a415885daa1c1cfe605516f6f68d64317cd05b1e8
openssl-static-1.0.1e-42.el7_1.10.s390x.rpm SHA-256: 91b03f3ddf8b8e742555caa7a093afd05d029e8c37d83a7035427664d2bce7b4

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.6

SRPM
openssl-1.0.1e-30.el6_6.12.src.rpm SHA-256: 05561a15daeefbff6cbf7f92a3c84d6e4c4ed2db71d5243aaf6f95c26fe9fc59
s390x
openssl-1.0.1e-30.el6_6.12.s390.rpm SHA-256: d65673ae3bfc9fc17222f68efea6d13f29d60b623b5798207fbc5295df49e989
openssl-1.0.1e-30.el6_6.12.s390x.rpm SHA-256: 5b09743f485f0baac61fe6448b9afdf16b27acd53bde823248b39e5315613c95
openssl-debuginfo-1.0.1e-30.el6_6.12.s390.rpm SHA-256: 3ab6449430f971a7325366d754ea4b114f03a39cb131c7f35f39c91372e38c00
openssl-debuginfo-1.0.1e-30.el6_6.12.s390x.rpm SHA-256: 79d73646292c415caf9f7181be053d22a6714f29dc12b4c69c9e006ffb3f536e
openssl-debuginfo-1.0.1e-30.el6_6.12.s390x.rpm SHA-256: 79d73646292c415caf9f7181be053d22a6714f29dc12b4c69c9e006ffb3f536e
openssl-devel-1.0.1e-30.el6_6.12.s390.rpm SHA-256: 7b21f6e03a11b083f4b27a32692f12a4374a07a70913b3660d1033379cdd0731
openssl-devel-1.0.1e-30.el6_6.12.s390x.rpm SHA-256: 52abe5535437b3324f6e24f5c3843bd14d0d804a6661a4ee771cfbbca5f06a85
openssl-perl-1.0.1e-30.el6_6.12.s390x.rpm SHA-256: d863e9cdbf91ae46de6f10fdee8a0f51aa60226daebd8480bc06f17b28ce68f0
openssl-static-1.0.1e-30.el6_6.12.s390x.rpm SHA-256: 110a3c1891b2e75c5a9f2fc948f4724a77d09084fcf43e76b69ac6d2a02685d2

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.1

SRPM
ppc64
openssl-1.0.1e-42.el7_1.10.ppc64.rpm SHA-256: d07e63a9fb01263c8cf5de63c405b07d9aae7690bcca9d0e2151faf8b14bfa48
openssl-debuginfo-1.0.1e-42.el7_1.10.ppc.rpm SHA-256: f3fd673e4b980a2980017f0eb4e211db77ba384edce370a70c75314b8877ef71
openssl-debuginfo-1.0.1e-42.el7_1.10.ppc.rpm SHA-256: f3fd673e4b980a2980017f0eb4e211db77ba384edce370a70c75314b8877ef71
openssl-debuginfo-1.0.1e-42.el7_1.10.ppc64.rpm SHA-256: 8dbaf7d05b76c11dca57d00b8975bee4a5986133eca9eb749de54fe314ac22d3
openssl-debuginfo-1.0.1e-42.el7_1.10.ppc64.rpm SHA-256: 8dbaf7d05b76c11dca57d00b8975bee4a5986133eca9eb749de54fe314ac22d3
openssl-devel-1.0.1e-42.el7_1.10.ppc.rpm SHA-256: c55a7115969827c6377e683166ce60b87b066f47de3db12105e4d7f53a144a5c
openssl-devel-1.0.1e-42.el7_1.10.ppc64.rpm SHA-256: 5484573d60d73827f093792ca68581d9aef4ebd45cf5844f040d4b67d29ac528
openssl-libs-1.0.1e-42.el7_1.10.ppc.rpm SHA-256: aa3cf48d70f3c5d9139dd6c95a768a6b990c2920aeba6388aea09ec1f96bac40
openssl-libs-1.0.1e-42.el7_1.10.ppc64.rpm SHA-256: ac2e6909b885d174d1d319853f31ee31ec7b35e1c7044f91ce4348a922acbe83
openssl-perl-1.0.1e-42.el7_1.10.ppc64.rpm SHA-256: 731336e71aa603ca234b6e0c7aa05c59a51125eb60ab248388008e52cced7aec
openssl-static-1.0.1e-42.el7_1.10.ppc.rpm SHA-256: 27f089e2a89e3c679ccf7ebbbd1778e323652b7e3098bc15b4f1f7b5328ccff6
openssl-static-1.0.1e-42.el7_1.10.ppc64.rpm SHA-256: 54fb81f12dc95dc903d56cc7989e5563021156b08f0eff2008342f81b2b24101

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.6

SRPM
openssl-1.0.1e-30.el6_6.12.src.rpm SHA-256: 05561a15daeefbff6cbf7f92a3c84d6e4c4ed2db71d5243aaf6f95c26fe9fc59
ppc64
openssl-1.0.1e-30.el6_6.12.ppc.rpm SHA-256: 7094dc63a1bb824078094afd93df933d51cf071ff7a5c47271b5a874e1c3c679
openssl-1.0.1e-30.el6_6.12.ppc64.rpm SHA-256: 3dc0da01e14187df3bfb32a96ddec7b9e410c25995b78715c2ff361318d7a649
openssl-debuginfo-1.0.1e-30.el6_6.12.ppc.rpm SHA-256: 37dd402b5cf154e490811ec862ede06d5e266d1655278c82aa368d2d1a86a10d
openssl-debuginfo-1.0.1e-30.el6_6.12.ppc64.rpm SHA-256: 40ee05f474e521c6c2318c3c7ddec094ae0e8d9a1a3033353e4065aaefadae77
openssl-debuginfo-1.0.1e-30.el6_6.12.ppc64.rpm SHA-256: 40ee05f474e521c6c2318c3c7ddec094ae0e8d9a1a3033353e4065aaefadae77
openssl-devel-1.0.1e-30.el6_6.12.ppc.rpm SHA-256: 36af0ff0317e0cfcda31abffadc7f5f9aab09561fda1a2539f6512a3a7c6a0ac
openssl-devel-1.0.1e-30.el6_6.12.ppc64.rpm SHA-256: 47b5469e9dfe18985dfaa11449ee11ab4eff6aff6b8074b1f134c3a668d3a64d
openssl-perl-1.0.1e-30.el6_6.12.ppc64.rpm SHA-256: c445dd8b91d3d7f31a830116c5b565d7e0b25f8faab33cad832219c143a41a6a
openssl-static-1.0.1e-30.el6_6.12.ppc64.rpm SHA-256: e0d04935e6180d0a77ec52bc364303bde71bb482fee55b7d9c34ea93ae7a3a06

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.6

SRPM
openssl-1.0.1e-30.el6_6.12.src.rpm SHA-256: 05561a15daeefbff6cbf7f92a3c84d6e4c4ed2db71d5243aaf6f95c26fe9fc59
x86_64
openssl-1.0.1e-30.el6_6.12.i686.rpm SHA-256: 7a726af15d048863c5003b5c3cb73511e15e443916b58d57ec8118831daee039
openssl-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 624246cd921b2475733b959d964e47d0cbb3ca97f3393ca9951bab1059725af5
openssl-debuginfo-1.0.1e-30.el6_6.12.i686.rpm SHA-256: d7c9327fd3336c05c99ff1c8c12d9f4be9ed1a4a553f7e59e3b45d1ef5988352
openssl-debuginfo-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 04492235043c10d5c66931e7e2c0e2d5a515cb408a0dcc310cc67f01a5b3940d
openssl-devel-1.0.1e-30.el6_6.12.i686.rpm SHA-256: a879e253e4be6cd59ac29a811c4b35b8ad355e789973dad2792578a26b1a9cf9
openssl-devel-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 3720bc9743d9780fe81839b3ae51cf5145cd0f9952b5bdc172714a9c013e0d41
i386
openssl-1.0.1e-30.el6_6.12.i686.rpm SHA-256: 7a726af15d048863c5003b5c3cb73511e15e443916b58d57ec8118831daee039
openssl-debuginfo-1.0.1e-30.el6_6.12.i686.rpm SHA-256: d7c9327fd3336c05c99ff1c8c12d9f4be9ed1a4a553f7e59e3b45d1ef5988352
openssl-devel-1.0.1e-30.el6_6.12.i686.rpm SHA-256: a879e253e4be6cd59ac29a811c4b35b8ad355e789973dad2792578a26b1a9cf9

Red Hat Enterprise Linux EUS Compute Node 7.1

SRPM
x86_64
openssl-1.0.1e-42.el7_1.10.x86_64.rpm SHA-256: 737b5a466095cfcb1ff5b174860e45b5b1169a1105a1bd710ae26d21fb50709d
openssl-debuginfo-1.0.1e-42.el7_1.10.i686.rpm SHA-256: 77c40b8898e238eec2ccc252c758e693d2d914231f6f33dbce3179f6127acaa4
openssl-debuginfo-1.0.1e-42.el7_1.10.i686.rpm SHA-256: 77c40b8898e238eec2ccc252c758e693d2d914231f6f33dbce3179f6127acaa4
openssl-debuginfo-1.0.1e-42.el7_1.10.x86_64.rpm SHA-256: 150f0a5de9283fcd5c54135d3d329f33c4a9870bef1f04987478a033ebf98c4a
openssl-debuginfo-1.0.1e-42.el7_1.10.x86_64.rpm SHA-256: 150f0a5de9283fcd5c54135d3d329f33c4a9870bef1f04987478a033ebf98c4a
openssl-devel-1.0.1e-42.el7_1.10.i686.rpm SHA-256: 73204f215c338878acde06c4ffaa90f298efa5a06ef4c004ca1aaa1509ed893f
openssl-devel-1.0.1e-42.el7_1.10.x86_64.rpm SHA-256: 66fa01844326511810a398e87e3fb8c92e59c391071a84732878168d9b4047c2
openssl-libs-1.0.1e-42.el7_1.10.i686.rpm SHA-256: faa1182a13b392111588b5f17b09984a1350a2b3be6db5a424e36ca5a9a0a699
openssl-libs-1.0.1e-42.el7_1.10.x86_64.rpm SHA-256: 29fd7eb611cf26f345f270ec8a1a177497dca924e0247e7d54f475ed978a60d3
openssl-perl-1.0.1e-42.el7_1.10.x86_64.rpm SHA-256: 12b1d61e64f5c1e13a63f7089475e0bc11cd3e974d9bc3c6e2734a353194fb5d
openssl-static-1.0.1e-42.el7_1.10.i686.rpm SHA-256: d2fd833e51ce2706f4b931caf43e5af781bb3ec55cdc84b287e760e6d9fca098
openssl-static-1.0.1e-42.el7_1.10.x86_64.rpm SHA-256: 97ab33b14031077a04a9e15ccfb4728a4ab606a3e88d47830036fcfe8ff74206

Red Hat Enterprise Linux EUS Compute Node 6.6

SRPM
openssl-1.0.1e-30.el6_6.12.src.rpm SHA-256: 05561a15daeefbff6cbf7f92a3c84d6e4c4ed2db71d5243aaf6f95c26fe9fc59
x86_64
openssl-1.0.1e-30.el6_6.12.i686.rpm SHA-256: 7a726af15d048863c5003b5c3cb73511e15e443916b58d57ec8118831daee039
openssl-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 624246cd921b2475733b959d964e47d0cbb3ca97f3393ca9951bab1059725af5
openssl-debuginfo-1.0.1e-30.el6_6.12.i686.rpm SHA-256: d7c9327fd3336c05c99ff1c8c12d9f4be9ed1a4a553f7e59e3b45d1ef5988352
openssl-debuginfo-1.0.1e-30.el6_6.12.i686.rpm SHA-256: d7c9327fd3336c05c99ff1c8c12d9f4be9ed1a4a553f7e59e3b45d1ef5988352
openssl-debuginfo-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 04492235043c10d5c66931e7e2c0e2d5a515cb408a0dcc310cc67f01a5b3940d
openssl-debuginfo-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 04492235043c10d5c66931e7e2c0e2d5a515cb408a0dcc310cc67f01a5b3940d
openssl-devel-1.0.1e-30.el6_6.12.i686.rpm SHA-256: a879e253e4be6cd59ac29a811c4b35b8ad355e789973dad2792578a26b1a9cf9
openssl-devel-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 3720bc9743d9780fe81839b3ae51cf5145cd0f9952b5bdc172714a9c013e0d41
openssl-perl-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 08357b6696807ff01e4e838578c82b00781732c78788b776944c2446a5148eee
openssl-static-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 05e3fe04b918e484d250bdcee0ce1d0f3e82c6f1cc9dbe34f7019ba71436ccb7

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.1

SRPM
ppc64le

Red Hat Enterprise Linux Server - TUS 6.6

SRPM
openssl-1.0.1e-30.el6_6.12.src.rpm SHA-256: 05561a15daeefbff6cbf7f92a3c84d6e4c4ed2db71d5243aaf6f95c26fe9fc59
x86_64
openssl-1.0.1e-30.el6_6.12.i686.rpm SHA-256: 7a726af15d048863c5003b5c3cb73511e15e443916b58d57ec8118831daee039
openssl-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 624246cd921b2475733b959d964e47d0cbb3ca97f3393ca9951bab1059725af5
openssl-debuginfo-1.0.1e-30.el6_6.12.i686.rpm SHA-256: d7c9327fd3336c05c99ff1c8c12d9f4be9ed1a4a553f7e59e3b45d1ef5988352
openssl-debuginfo-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 04492235043c10d5c66931e7e2c0e2d5a515cb408a0dcc310cc67f01a5b3940d
openssl-debuginfo-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 04492235043c10d5c66931e7e2c0e2d5a515cb408a0dcc310cc67f01a5b3940d
openssl-devel-1.0.1e-30.el6_6.12.i686.rpm SHA-256: a879e253e4be6cd59ac29a811c4b35b8ad355e789973dad2792578a26b1a9cf9
openssl-devel-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 3720bc9743d9780fe81839b3ae51cf5145cd0f9952b5bdc172714a9c013e0d41
openssl-perl-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 08357b6696807ff01e4e838578c82b00781732c78788b776944c2446a5148eee
openssl-static-1.0.1e-30.el6_6.12.x86_64.rpm SHA-256: 05e3fe04b918e484d250bdcee0ce1d0f3e82c6f1cc9dbe34f7019ba71436ccb7

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Twitter Facebook