open ssl heat bleed 漏洞修复
来源:互联网 发布:linux 命令行 迅雷 编辑:程序博客网 时间:2024/06/07 02:54
本次收影响的版本:
1.0.1
1.0.1a
1.0.1b
1.0.1c
1.0.1d
1.0.1e
1.0.1f
- If the openssl version is 1.0.1, it needs to be updated. If it is anything lower, this server doesn't need any changes, write it to the email for Jennifer.
- SO if it is 1.0.1, update it with following command. Make sure it gets updated to version 1.0.1e-16.el6_5.7
- If it is Ubuntu server, update with following command. Make sure it gets updated to version 1.0.1-4ubuntu5.12
- After you updated openssl, services that use it need to be restarted, most importantly the ones which are facing customer. Get a list of these services with following commands (second one possibly giving more processes)
ps uwwp $(find /proc -maxdepth 2 -name maps -exec grep -HE '/libssl\.so.*' {} \; | cut -d/ -f3 | sort -u) ps uwwp $(find /proc -maxdepth 2 -name maps -exec grep -HE '/libcrypto\.so.*' {} \; | cut -d/ -f3 | sort -u)
- restart these services, if they are on the list: httpd, nginx, php-fpm, tomcat, haproxy. You don't need to restart the rest,
0 0
- open ssl heat bleed 漏洞修复
- Ruby 更新修复了 SSL 中间人漏洞
- SSL 3.0 Poodle漏洞修复方法
- SSL 3.0 Poodle漏洞修复方法
- 服务器SSL不安全漏洞修复方案
- SSH&SSL弱加密算法漏洞修复
- 漏洞修复
- 漏洞修复
- 漏洞修复
- First Bleed
- SSL/TLS Suffers ‘Bar Mitzvah Attack’漏洞检测方法及修复建议
- Heat
- struts2的漏洞修复
- web漏洞修复
- OpenSSL漏洞升级修复
- Oracle 漏洞修复方案
- “破壳”(Shellshock)漏洞修复
- Struts2漏洞修复方案
- 莫名其妙烦躁的一天
- tomcat 报错 X connection to localhost:10.0 host broken (explicit kill or server shutdown)
- Notifier chain 全面分析
- imacros学习笔记
- 对象和数组的相互转化
- open ssl heat bleed 漏洞修复
- 解读:安卓手机上的三轴陀螺仪
- Linux内核通知链 notifier chain
- Android触摸事件机制
- c#中如何控制模态子窗体中的进度条
- OSCACHE应用
- linux中sudo命令的使用方法
- COPRA-for-AutoCAD 2005
- HTML5解决跨域问题