Re: CVE-2014-0160 CentOS 6 openssl heartbleed workaround

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Hi,

What else needs to be restarted ?
Anything reported by the lsof commands above ?

Thank you,
I.



On Tue, Apr 8, 2014 at 9:33 PM, Robert Arkiletian <robark@xxxxxxxxx> wrote:

> On Tue, Apr 8, 2014 at 6:23 AM, Leon Fauster <leonfauster@xxxxxxxxxxxxxx>
> wrote:
> > Am 08.04.2014 um 15:02 schrieb James Hogarth <james.hogarth@xxxxxxxxx>:
> >> On 8 April 2014 12:08, Steven Tardy <sjt5atra@xxxxxxxxx> wrote:
> >>
> >>> On Tue, Apr 8, 2014 at 2:56 AM, Keith Keller <
> >>> kkeller@xxxxxxxxxxxxxxxxxxxxxxxxxx> wrote:
> >>>
> >>>> On 2014-04-08, Karanbir Singh <kbsingh@xxxxxxxxxx> wrote:
> >>>>
> >>>> is there an easy way to know which services need to be kicked?
> >>>>
> >>>
> >>>
> >>> rpm -q --whatrequires openssl
> >>
> >>
> >> A slightly cleaner way:
> >>
> >> lsof -n | grep ssl | grep DEL
> >
> > lsof -n | grep -E 'libcry|libssl' | grep DEL
> >
>
> if you include libcrypto in the grep then sshd is affected.
> _______________________________________________
> CentOS mailing list
> CentOS@xxxxxxxxxx
> http://lists.centos.org/mailman/listinfo/centos
>
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux