[CentOS] CVE-2014-0160 CentOS 6 openssl heartbleed workaround
Robert Arkiletian
robark at gmail.comTue Apr 8 18:33:22 UTC 2014
- Previous message: [CentOS] CVE-2014-0160 CentOS 5.x openssl heartbleed workaround
- Next message: [CentOS] CVE-2014-0160 CentOS 6 openssl heartbleed workaround
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
On Tue, Apr 8, 2014 at 6:23 AM, Leon Fauster <leonfauster at googlemail.com> wrote: > Am 08.04.2014 um 15:02 schrieb James Hogarth <james.hogarth at gmail.com>: >> On 8 April 2014 12:08, Steven Tardy <sjt5atra at gmail.com> wrote: >> >>> On Tue, Apr 8, 2014 at 2:56 AM, Keith Keller < >>> kkeller at wombat.san-francisco.ca.us> wrote: >>> >>>> On 2014-04-08, Karanbir Singh <kbsingh at centos.org> wrote: >>>> >>>> is there an easy way to know which services need to be kicked? >>>> >>> >>> >>> rpm -q --whatrequires openssl >> >> >> A slightly cleaner way: >> >> lsof -n | grep ssl | grep DEL > > lsof -n | grep -E 'libcry|libssl' | grep DEL > if you include libcrypto in the grep then sshd is affected.
- Previous message: [CentOS] CVE-2014-0160 CentOS 5.x openssl heartbleed workaround
- Next message: [CentOS] CVE-2014-0160 CentOS 6 openssl heartbleed workaround
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
More information about the CentOS mailing list