Re: CVE-2014-0160 CentOS 6 openssl heartbleed workaround

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 2014-04-08, James Hogarth <james.hogarth@xxxxxxxxx> wrote:
>
> Tomcat, apache httpd, postfix, postgresl, mysql... best just to restart any
> network facing application that has SSL enabled ;)

Actually, I should have been more thorough: I am also interested in
knowing which credentials were vulnerable, so I can set policy on what
passwords must be changed as soon as possible.  If sshd had been
vulnerable, for example, I would have to force them to change that
password immediately.

--keith

-- 
kkeller@xxxxxxxxxxxxxxxxxxxxxxxxxx


_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux