Thanks for this, wouldn't have known otherwise, but there goes my Wednesday! Riley Childs Student Asst. Head of IT Services Charlotte United Christian Academy (704) 497-2086 RileyChilds.net Sent from my Windows Phone, please excuse mistakes ________________________________ From: Thomas Bennett<mailto:[log in to unmask]> Sent: ý4/ý8/ý2014 3:01 PM To: [log in to unmask]<mailto:[log in to unmask]> Subject: Re: [CODE4LIB] Serious vulnerability in OpenSSL There is this one for CentOS 6 http://people.centos.org/z00dax/disable_heartbeat/x86_64/Packages/ They are "disabled_heartbeat" versions, download your version and use rpm -ivh --force your_version_here to overwrite your current openssl executable. The following were sent out from our campus network security guy: For those running any of the following distributions, updates to OpenSSL are now available: Ubuntu http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-0160.html Debian https://security-tracker.debian.org/tracker/CVE-2014-0160 RHEL http://rhn.redhat.com/errata/RHSA-2014-0376.html CentOS http://lists.centos.org/pipermail/centos-announce/2014-April/020249.html Gentoo http://www.gentoo.org/security/en/glsa/glsa-201404-07.xml Cygwin (okay, not a distribution, but they were second only behind Gentoo in patching) http://cygwin.com/packages/x86/libopenssl100/ kmw Thomas Sent from me, not an iThing, droid or other, just me ==================================================== Support Request http://portal.support.appstate.edu ==================================================== Thomas McMillan Grant Bennett Appalachian State University Operations & Systems Analyst P O Box 32026 University Library Boone, North Carolina 28608 (828) 262 6587 Library Systems http://www.library.appstate.edu ==================================================== Confidentiality Notice: This communication constitutes an electronic communication within the meaning of the Electronic Communications Privacy Act, 18 U.S.C. Section 2510, and its disclosure is strictly limited to the recipient intended by the sender of this message. If you are not the intended recipient, any disclosure, copying, distribution or use of any of the information contained in or attached to this transmission is STRICTLY PROHIBITED. Please contact this office immediately by return e-mail or at 828-262-6587, and destroy the original transmission and its attachment(s), if any, if you are not the intended recipient. On Apr 8, 2014, at 10:12 AM, Becky Yoose wrote: > Thanks for forwarding this along, Cary. I've been patching this morning, > and am now in the process of determine needs for new certs. (sigh...) > > If you need some guidance in patching your server, here are a couple of > links to start y'all out: > > Ubuntu-related patch info - https://gist.github.com/coderanger/10084033 ; > http://askubuntu.com/questions/444702/how-to-patch-cve-2014-0160-in-openssl/444829#444829 > https://serverfault.com/questions/587329/heartbleed-what-is-it-and-what-are-options-to-mitigate-it > https://security.stackexchange.com/questions/55075/does-heartbleed-mean-new-certificates-for-every-ssl-server/55087 > https://unix.stackexchange.com/questions/123711/how-do-i-recover-from-the-heartbleed-bug-in-openssl > > Thanks, > Becky, who already broke into her chocolate stash before 8:45 in the > morning. > > > > On Tue, Apr 8, 2014 at 9:06 AM, Cary Gordon <[log in to unmask]> wrote: > >> Please read this page and its supporting documents about the Heartbleed >> Bug. >> >> http://heartbleed.com/ >> >> If you use OpenSSL, and most service providers do, you should patch your >> servers ASAP. OpenSSL versions 1.0.1 through 1.0.1f (inclusive) are >> vulnerable. Only version 1.0.1g or newer should be used. >> >> Apologies for multiple postings. >> >> Thanks, >> >> Cary >> >> Cary Gordon >> The Cherry Hill Company >> Los Angeles, CA >>