Probably a good idea.I guess we should change root password if we logged in WHM:2087 before updating OpenSSL?
Probably a good idea.I guess we should change root password if we logged in WHM:2087 before updating OpenSSL?
rpm -qa |grep openssl
openssl-1.0.1e-16.el6_5.7.x86_64
openssl-devel-1.0.1e-16.el6_5.7.x86_64
"yum update openssl" seems to be handling it:The patched OpenSSL 1.0.1 RPM has already been published to the RHEL 6 and CentOS 6 repositories, so the only steps that should be necessary to update these servers are to run "yum update" to install the updated version of OpenSSL and then either fully restart all SSL-enabled services, including sshd, or reboot the server.
No. that is enough. Just don't forget to restart:Do we need to do a full "yum update"?
Norman
That should handle it for this issue, but it's usually a good idea to make sure all your other RPMs are updated too."yum update openssl" seems to be handling it:
Updated:
openssl.x86_64 0:1.0.1e-16.el6_5.7
Dependency Updated:
openssl-devel.x86_64 0:1.0.1e-16.el6_5.7
Do we need to do a full "yum update"?
Norman
Yes, that is correct.Just want to confirm, if we are running CentOS 5.10, we are not vulnerable and no steps need to be applied?
[email protected] [/var/log]# rpm -qa |grep openssl
openssl-0.9.8e-27.el5_10.1
openssl-devel-0.9.8e-27.el5_10.1
openssl-0.9.8e-27.el5_10.1
openssl-devel-0.9.8e-27.el5_10.1
Thank you!
No, just stop/startDoes apache needs to be recompiled after applying the patch?
I have used "yum update" and "yum update openssl" and Update server / system software via WHM and it appears no updates are made (from the output). I have restarted the server etc.
Which from what I read IS vulnerable.
Am I right in assuming I am good to go here? I am just confused as the version of OpenSSL is reported as OpenSSL 1.0.1e-fips 11 Feb 2013 and was reported as this before I attempted any update?[email protected] [~]# rpm -q --changelog openssl-1.0.1e
* Mon Apr 07 2014 Tomáš Mráz <[email protected]> 1.0.1e-16.7
- fix CVE-2014-0160 - information disclosure in TLS heartbeat extension
Mine is, as posted by InfoPro, also works.Code:WHM » Software » Update System Software
checkyum version 21.1
Loaded plugins: fastestmirror
Loading mirror speeds from cached hostfile
* base: mirrors.adams.net
* epel: ftp.osuosl.org
* extras: ftp.osuosl.org
* rpmforge: mirror.webnx.com
* rpmfusion-free-updates: mirror.web-ster.com
* updates: centos.mirror.facebook.net
Setting up Update Process
No Packages marked for Update
checkyum version 21.1
Your output from the changelog shows your version was backported or otherwise patched to fix this.Hello,
I've read a few forum posts regarding this but am a little confused and would appreciate some clarification.
I checked my version of OpenSSL
I have used "yum update" and "yum update openssl" and Update server / system software via WHM and it appears no updates are made (from the output). I have restarted the server etc.
I am on CentOS 6 and only installed WHM/Cpanel about 7 days ago on this new server.
Which from what I read IS vulnerable.
However, I also read that if the changelog has an update from Tomas Mraz regarding this, that I am using the "safe version".
So my OpenSSL changelog output shows the following:
Am I right in assuming I am good to go here? I am just confused as the version of OpenSSL is reported as OpenSSL 1.0.1e-fips 11 Feb 2013 and was reported as this before I attempted any update?
Thanks
[email protected] [~]# rpm -q --changelog openssl-1.0.1e
* Mon Apr 07 2014 Tomáš Mráz <[email protected]> 1.0.1e-16.7
- fix CVE-2014-0160 - information disclosure in TLS heartbeat extension
What version of CentOS are you running? v5 isn't vulnerable.Mine is
My VPS has OpenSSL 1.0.1e-fips 11 Feb 2013Code:checkyum version 21.1 Loaded plugins: fastestmirror Loading mirror speeds from cached hostfile * base: mirrors.adams.net * epel: ftp.osuosl.org * extras: ftp.osuosl.org * rpmforge: mirror.webnx.com * rpmfusion-free-updates: mirror.web-ster.com * updates: centos.mirror.facebook.net Setting up Update Process No Packages marked for Update checkyum version 21.1
How can I update OpenSSL?
rpm -q --changelog openssl-1.0.1e|head
I have upgraded the kernel and everything else, but openSSL is not upgrading to 1.0.1g
I have tried several times but actually CENTOS repository still delivery the 1.0.1e (which is bugged):
# yum update openssl
Loaded plugins: fastestmirror
Loading mirror speeds from cached hostfile
* base: mirrors.prometeus.net
* extras: mirrors.prometeus.net
* updates: mirrors.prometeus.net
Setting up Update Process
No Packages marked for Update
Why CPanel is using "mirrors.prometeus.net" as repository?
and why is not updated with latest patch?
Thanks,
Max