This OpenSSL Heartbleed vulnerability is very serious, it is recommended that you upgrade the work machine, see the specific information: http://heartbleed.com/
See the affected versions and repair methods below.
Affected Versions:
1.0.1
1.0.1a
1
Post an informed answer:
There is also a service that tests whether the Web site is affected: Test your server for Heartbleed (cve-2014-0160) (now long 503)
According to the description on the page, this OpenSSL implementation vulnerability can
The OpenSSL Heart Bleed vulnerability has been confusing for the past two days. Please read this article to analyze and diagnose the OpenSSL Heartbleed Bug. Currently, we can see that the versions that can exploit this vulnerability are:OpenSSL 1.0.1
Should the server operating system choose Debian/ubuntu or CentOS?In fact, I think most of his statements are not wrong. If you need to install a server, you really prefer RH system.But...Contact QQ 2880990294 Phone 18326835655Fuzhou Boutique
Ultimate Solution to CentOS Bash Vulnerabilities
Software and systems that have been successfully used: All Linux operating systems that have installed GNU bash versions earlier than or equal to 4.3. Bash vulnerability Description: This
Windows 10 + CentOS7 dual system (UEFI + GPT)Preface
I really want to install the Windows 10 + CentOS7 dual system. However, I have learned a lot from the previous installation failure. I checked a lot of information and finally decided to try again
Simple Security Configuration for CentOS 6 servers
Linux is an open system that allows you to find many ready-made programs and tools on the network. This facilitates both users and hackers, because they can also easily find programs and tools to
Wget, an open-source application in CentOS, discovers severe security vulnerabilitiesWget, an open-source application widely used in CentOS and Unix systems, has discovered a serious security vulnerability, allowing attackers to create arbitrary
This article shows you how to set stronger SSL on a Nginx Web server. We are implementing this method by weakening the crime attack by invalidating the SSL. Do not use the vulnerable SSLv3 in the protocol and the following version and we will set up
High-risk bash vulnerabilities are detected. Be careful with your server!
Background:
On July 15, September 25, Beijing time, a Linux User got another"Surprise"! The Red Hat security team found a hidden and dangerous security vulnerability in the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.