You’ve certainly heard about Heartbleed by now. If not, you can read more about this vulnerability at Heartbleed.com. Continue reading this post to find out if you’re vulnerable, and how to patch your server.
Once you understand it, you’ll want to patch your system. If you’re running Centos 5, you don’t need to worry because it doesn’t have the version of OpenSSL that is vulnerable.
If you’re running Centos 6, read on and patch.
1. Run this test to see if you’re patched:
|
1 |
rpm -q --changelog openssl-1.0.1e-16.el6_5.7.x86_64 | grep -B 1 CVE-2014-0160 |
If you see the following output, you’re patched (skip to #3):
|
1 2 3 |
root@linuxbrigade.com [~]# rpm -q --changelog openssl-1.0.1e-16.el6_5.7.x86_64 | grep -B 1 CVE-2014-0160 * Mon Apr 07 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-16.7 - fix CVE-2014-0160 - information disclosure in TLS heartbeat extension |
2. If you didn’t see the output above stating you are already patched, run ‘yum update’ to install the patch:
|
1 |
yum update |
You’ll see some things scroll by, but noticeably this package in particular:
|
1 2 |
openssl-1.0.1e-16.el6_5.7.x86_64.rpm openssl-devel-1.0.1e-16.el6_5.7.x86_64.rpm |
You can run that command from #1 if you like to ensure things went well.
3. Reboot the server (this is probably a good time to take advantage of any kernel updates that may have installed as well!)
4. If you’d like to test from the outside, you can use this test:
http://filippo.io/Heartbleed/
5. You’re done.. move on to the next server.








