Re: CVE-2014-0160 CentOS 6 openssl heartbleed workaround

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 8 April 2014 12:08, Steven Tardy <sjt5atra@xxxxxxxxx> wrote:

> On Tue, Apr 8, 2014 at 2:56 AM, Keith Keller <
> kkeller@xxxxxxxxxxxxxxxxxxxxxxxxxx> wrote:
>
> > On 2014-04-08, Karanbir Singh <kbsingh@xxxxxxxxxx> wrote:
> > >
> > > Earlier in the day today, we were made aware of a serious
> > > issue in openssl as shipped in CentOS-6.5 ( including updates issued
> > > since CentOS-6.5 was released ); This issue is addressed in detail at
> > > http://heartbleed.com/
> >
> >  is there an easy way to know which services need to be kicked?
> >
>
>
> rpm -q --whatrequires openssl


A slightly cleaner way:

lsof -n | grep ssl | grep DEL

That should show any processes that are using the old deleted library for
you to restart...

Tomcat, apache httpd, postfix, postgresl, mysql... best just to restart any
network facing application that has SSL enabled ;)
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux