Community Dashboard

08
Apr

OpenSSL Heartbleed fix available

Posted by on in ClearFoundation
  • Font size: Larger Smaller
  • Hits: 17923
  • 1 Comment
  • Print

The security update for the OpenSSL Heartbleed issue has been released for the ClearOS Professional Edition.  The update for the Community Edition should be available in the next 12-48 hours.  You can find more information about this update here.

Note: the issue does not impact ClearOS 5.x systems.

Update (April 8, 10 pm EST): The fix for the Community Edition has now been promoted from testing to official updates.  All the mirrors will have the up-to-date in a few hours.

 

 

0
Medium
Legacy Disabled has not set their biography yet

Message Author | Add as friend | View author's profile | Show more posts from author | Subscribe to updates from author

Achievements

  • Bookworm
  • The Voice

Overall Rating (0)

0 out of 5 stars

People in this conversation

  • As with all fixes, ClearOS performs fixes to the existing version numbers. This is why you will still the version 'e' when you investigate. What is important is the minor version numbers.

    You can validate that you have the patch by running:

    rpm -qi openssl

    You should have results similar to this:

    [root@office ~]# rpm -qi openssl
    Name : openssl Relocations: (not relocatable)
    Version : 1.0.1e Vendor: CentOS
    Release : 16.el6_5.7 Build Date: Mon 07 Apr 2014 08:43:19 PM MDT
    Install Date: Tue 08 Apr 2014 06:30:58 PM MDT Build Host: c6b10.bsys.dev.centos.org
    Group : System Environment/Libraries Source RPM: openssl-1.0.1e-16.el6_5.7.src.rpm
    Size : 4209635 License: OpenSSL
    Signature : RSA/SHA1, Mon 07 Apr 2014 08:49:16 PM MDT, Key ID 0946fca2c105b9de
    Packager : CentOS BuildSystem
    URL : http://www.openssl.org/
    Summary : A general purpose cryptography library with TLS implementation
    Description :
    The OpenSSL toolkit provides support for secure communications between
    machines. OpenSSL includes a certificate management tool and shared
    libraries which provide various cryptographic algorithms and
    protocols.

    So while the version is '1.0.1e' the subversion has been incremented to 16.el6_5.7. If you are running this version or later, you already have the patch. A restart of your web services is required but the patch should also take care of that for you. If you are still nervous, run the following:

    service httpd restart && service webconfig restart

    The reason why ClearOS backports fixes into existing version numbers rather than incrementing version numbers is for compatibility reasons. Some software depends on different versions, symbols and other objects. Incrementing versions can cause cascading failures in the dependency trees. One of the reasons why ClearOS enjoys such stability comes from the long-standing tradition of fixing software in this manner.

    Here you can read about why other vendors do the same:

    https://access.redhat.com/site/security/updates/backporting/?sc_cid=3093

    0 Like