OpenSSL TLS心跳读远程信息泄露漏洞 (CVE-2014-0160) 漏洞更新修复
乌云介绍:http://www.wooyun.org/bugs/wooyun-2014-056253在线检测:http://wangzhan.360.cn/heartbleed
OpenSSL TLS心跳读远程信息泄露漏洞 (CVE-2014-0160)修复脚本如下
openssl version -a查看版本
wget http://www.openssl.org/source/openssl-1.0.1g.tar.gz
tar -zxvf openssl-1.0.1g.tar.gz
cd openssl-1.0.1g
./config shared zlib
make
make test
make install
rm -rf /usr/bin/openssl.OFF
mv /usr/bin/openssl /usr/bin/openssl.OFF
rm -rf /usr/include/openssl.OFF
mv /usr/include/openssl /usr/include/openssl.OFF
ln -s /usr/local/ssl/bin/openssl /usr/bin/openssl
ln -s /usr/local/ssl/include/openssl /usr/include/openssl
echo "/usr/local/ssl/lib" >> /etc/ld.so.conf
ldconfig -v
完成后reboot重启生效
谢谢楼主,祝你找个漂亮女朋友,给你戴个绿帽子 yum update tomsen 发表于 2014/4/10 14:57
yum update
没用的。。yum更新不及时 话说已经更新到1.0.1g,赶紧的看了下./kangle -v 我就不淡定了
# ./kangle -v
kangle/3.2.6(enterprise) build with support: ipv6 ssl(sni) large-file anti-cc big-object upstream-ssl disk-cache sqlite-disk-index
pcre version: 7.8 2008-09-05
openssl version: OpenSSL 1.0.1e-fips 11 Feb 2013
UPDATE_CODE: centos6-x64
#
{:128:}
刚买了3年的ssl授权
页:
[1]