Jump to content
Sign in to follow this  
Sparks

Heartbleed

Recommended Posts

on this server? what version did you upgrade to 1.0.1g? 

 

Yes, on this server. And we're on version 1.0.1e now.

Share this post


Link to post
Share on other sites

Yes, on this server. And we're on version 1.0.1e now.

 

pretty sure that version still has the bug.... its from versions 1.0.1 through to 1.0.1f 

so 1.0.1g will fix it.... 

Share this post


Link to post
Share on other sites

pretty sure that version still has the bug.... its from versions 1.0.1 through to 1.0.1f 

so 1.0.1g will fix it.... 

 

Not necessarily. All Linux distros have patched their versions so the built date says more than the version right now (ours was build on the 8th of april meaning it's the safe version). I tested it out myself and unlike a few days ago I cannot get it to spit out random data any more.

Share this post


Link to post
Share on other sites

1.0.1e centos server patched for the bug which enabled the exploit until the next version (1.0.1g) is officially released on centos server. we were covered within hours of the announcement

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this  

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use and Privacy Policy.