Search OpenSSL Heartbleed on the Internet to view tens of thousands of related content. Not only is online banking affected, but many security links encrypted through OpenSSL have certain risks. Therefore, it is best to upgrade all its OpenSSL as soon as possible.
For example, the OpenSSL version of The RedHat system is 0.9.8, and non-registered users cannot automatically upgrade to the latest version 1.0.1g through yum.
However, we can use the source code for manual updates without the need to uninstall the original OpenSSL.
OpenSSL TLS heartbeat read remote information leakage (CVE-2014-0160)
Severe OpenSSL bug allows attackers to read 64 KB of memory, fixed in half an hour in Debian
OpenSSL "heartbleed" Security Vulnerability
Provides FTP + SSL/TLS authentication through OpenSSL and implements secure data transmission.
The procedure is as follows:
Wget http://www.openssl.org/source/openssl-1.0.1e.tar.gz
Tar-xzvf openssl-1.0.1e.tar.gz
Cd openssl-1.0.1e
./Config shared zlib -- prefix =/usr/local/openssl
Make
Make install
# Backup old openssl
Mv/usr/bin/openssl. OFF
# Backup old openssl include
Mv/usr/include/openssl. OFF
# Link new openssl
Ln-s/usr/local/openssl/bin/openssl/usr/bin/openssl
Ln-s/usr/local/openssl/include/openssl/usr/include/openssl
Echo "/usr/local/openssl/lib">/etc/ld. so. conf
Ldconfig-v
Openssl version
In this way, you don't have to worry about uninstalling the associated software to easily solve the "heartbleed" vulnerability.
For more information about Heartbleed, click here.
Heartbleed: click here