This OpenSSL Heartbleed vulnerability is very serious, it is recommended that you upgrade the work machine, see the specific information: http://heartbleed.com/
See the affected versions and repair methods below.
Affected Versions:
- 1.0.1
- 1.0.1a
- 1.0.1b
- 1.0.1c
- 1.0.1d
- 1.0.1e
- 1.0.1f
How to view your OpenSSL version
Rpm-q openssl
Or
Dpkg-query-W openssl
Each release version already has a patched version.
1.0.1e-2 + deb7u5 is reported as patched on debian,
1.0.1e-16. el6_5.7 is reported as patched in RedHat and CentOS
1.0.1e-37.66 changelogs note this has been patched on Amazon AMI
CentOS upgrade method. I use CentOS. For other tools, refer to them.
Yum install openssl-y
For more information about Ubuntu, see upgrade commands:
Apt-get update
Apt-get install openssl
View services to be restarted
Lsof-n | grep libssl | awk '{print $1}' | sort | uniq
Restart these services.
For more information about Heartbleed, click here.
Heartbleed: click here
OpenSSL TLS heartbeat read remote information leakage (CVE-2014-0160)
Severe OpenSSL bug allows attackers to read 64 KB of memory, fixed in half an hour in Debian
OpenSSL "heartbleed" Security Vulnerability
Provides FTP + SSL/TLS authentication through OpenSSL and implements secure data transmission.