Re: CVE-2014-0160 CentOS 6 openssl heartbleed workaround

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Tue, 2014-04-08 at 19:12 +0200, Alain Péan wrote:
> Le 08/04/2014 19:05, Tony Mountifield a écrit :
> > And I notice that the new libraries after applying the update are
> > STILL called 1.0.1e - is that correct? Could be confusing.
> 
> Because at this time, it's only a workaround that disable certain 
> services, not a fix to the libraries, as I read in the annoucement ?
> 
> Alain
> 

If you: rpm -qa | grep openssl

If you have: openssl-1.0.1e-16.el6_5.4.0.1

You have the package with affected elements disabled. These were made
until the final fixes could be brought in and applied.

If you have: openssl-1.0.1e-16.el6_5.7

You have the package with the upstream fix(es) applied and supersedes
the openssl-1.0.1e-16.el6_5.4.0.1 packages.

Regards

Phil

-- 

Phil Wyett
{
    GNU Linux User and Developer
    Leigh GNU Linux User Group (http://leigh.lug.org.uk)
    IRC: philwyett
    Twitter: philwyett and leigh_lug
}

Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux