[CentOS] CentOS-announce Digest, Vol 79, Issue 1

Fri Sep 2 16:00:03 UTC 2011
centos-announce-request at centos.org <centos-announce-request at centos.org>

Send CentOS-announce mailing list submissions to
	centos-announce at centos.org

To subscribe or unsubscribe via the World Wide Web, visit
	http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
	centos-announce-request at centos.org

You can reach the person managing the list at
	centos-announce-owner at centos.org

When replying, please edit your Subject line so it is more specific
than "Re: Contents of CentOS-announce digest..."


Today's Topics:

   1. CESA-2011:1245 Important CentOS 4 i386 httpd -	security
      update (Tru Huynh)
   2. CESA-2011:1245 Important CentOS 4 x86_64 httpd -	security
      update (Tru Huynh)


----------------------------------------------------------------------

Message: 1
Date: Thu, 1 Sep 2011 13:41:08 +0200
From: Tru Huynh <tru at centos.org>
Subject: [CentOS-announce] CESA-2011:1245 Important CentOS 4 i386
	httpd -	security update
To: centos-announce at centos.org
Message-ID: <20110901114108.GA27052 at sillage.bis.pasteur.fr>
Content-Type: text/plain; charset="us-ascii"

CentOS Errata and Security Advisory CESA-2011:1245

httpd security update for CentOS 4 i386:
https://rhn.redhat.com/errata/RHSA-2011-1245.html

The following updated file has been uploaded and is currently syncing to
the mirrors:

i386:
updates/i386/RPMS/httpd-2.0.52-48.ent.centos4.i386.rpm
updates/i386/RPMS/httpd-devel-2.0.52-48.ent.centos4.i386.rpm
updates/i386/RPMS/httpd-manual-2.0.52-48.ent.centos4.i386.rpm
updates/i386/RPMS/httpd-suexec-2.0.52-48.ent.centos4.i386.rpm
updates/i386/RPMS/mod_ssl-2.0.52-48.ent.centos4.i386.rpm

source:
updates/SRPMS/httpd-2.0.52-48.ent.centos4.src.rpm

You may update your CentOS-4 i386 installations by running the command:

        yum update httpd\*

Tru
-- 
Tru Huynh (mirrors, CentOS i386/x86_64 Package Maintenance)
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xBEFA581B
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.centos.org/pipermail/centos-announce/attachments/20110901/12eb0fbc/attachment-0001.bin 

------------------------------

Message: 2
Date: Thu, 1 Sep 2011 13:41:34 +0200
From: Tru Huynh <tru at centos.org>
Subject: [CentOS-announce] CESA-2011:1245 Important CentOS 4 x86_64
	httpd -	security update
To: centos-announce at centos.org
Message-ID: <20110901114134.GB27052 at sillage.bis.pasteur.fr>
Content-Type: text/plain; charset="us-ascii"

CentOS Errata and Security Advisory CESA-2011:1245

httpd security update for CentOS 4 x86_64:
https://rhn.redhat.com/errata/RHSA-2011-1245.html

The following updated file has been uploaded and is currently syncing to
the mirrors:

x86_64:
updates/x86_64/RPMS/httpd-2.0.52-48.ent.centos4.x86_64.rpm
updates/x86_64/RPMS/httpd-devel-2.0.52-48.ent.centos4.x86_64.rpm
updates/x86_64/RPMS/httpd-manual-2.0.52-48.ent.centos4.x86_64.rpm
updates/x86_64/RPMS/httpd-suexec-2.0.52-48.ent.centos4.x86_64.rpm
updates/x86_64/RPMS/mod_ssl-2.0.52-48.ent.centos4.x86_64.rpm

source:
updates/SRPMS/httpd-2.0.52-48.ent.centos4.src.rpm

You may update your CentOS-4 x86_64 installations by running the command:

        yum update httpd\*

Tru
-- 
Tru Huynh (mirrors, CentOS i386/x86_64 Package Maintenance)
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xBEFA581B
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.centos.org/pipermail/centos-announce/attachments/20110901/b510b7d5/attachment-0001.bin 

------------------------------

_______________________________________________
CentOS-announce mailing list
CentOS-announce at centos.org
http://lists.centos.org/mailman/listinfo/centos-announce


End of CentOS-announce Digest, Vol 79, Issue 1
**********************************************