[CentOS] CVE-2014-0160 CentOS 6 openssl heartbleed workaround
Ionut Hoza
ionutz22 at gmail.comTue Apr 8 21:14:46 UTC 2014
- Previous message: [CentOS] CVE-2014-0160 CentOS 6 openssl heartbleed workaround
- Next message: [CentOS] CVE-2014-0160 CentOS 6 openssl heartbleed workaround
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Hi, What else needs to be restarted ? Anything reported by the lsof commands above ? Thank you, I. On Tue, Apr 8, 2014 at 9:33 PM, Robert Arkiletian <robark at gmail.com> wrote: > On Tue, Apr 8, 2014 at 6:23 AM, Leon Fauster <leonfauster at googlemail.com> > wrote: > > Am 08.04.2014 um 15:02 schrieb James Hogarth <james.hogarth at gmail.com>: > >> On 8 April 2014 12:08, Steven Tardy <sjt5atra at gmail.com> wrote: > >> > >>> On Tue, Apr 8, 2014 at 2:56 AM, Keith Keller < > >>> kkeller at wombat.san-francisco.ca.us> wrote: > >>> > >>>> On 2014-04-08, Karanbir Singh <kbsingh at centos.org> wrote: > >>>> > >>>> is there an easy way to know which services need to be kicked? > >>>> > >>> > >>> > >>> rpm -q --whatrequires openssl > >> > >> > >> A slightly cleaner way: > >> > >> lsof -n | grep ssl | grep DEL > > > > lsof -n | grep -E 'libcry|libssl' | grep DEL > > > > if you include libcrypto in the grep then sshd is affected. > _______________________________________________ > CentOS mailing list > CentOS at centos.org > http://lists.centos.org/mailman/listinfo/centos >
- Previous message: [CentOS] CVE-2014-0160 CentOS 6 openssl heartbleed workaround
- Next message: [CentOS] CVE-2014-0160 CentOS 6 openssl heartbleed workaround
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
More information about the CentOS mailing list