Friday, April 11, 2014

Patching OpenSSL for the Heartbleed Vulnerability CVE-2014-0160 in Mac OS X and Ubuntu / CentOS / Fedora

From 7th April we should update our OpennSSL version. Why? Security reasons. An OppenSSL vulnerability was disclosed which has been called one of the worst security holes in the last years. Let's do it!

OSX with MacPorts

To know your current version type: openssl version -a

myMac:~ Myself$ openssl version -a
OpenSSL 1.0.1f 6 Jan 2014

Opps, I have a bug in my system. It's time to update and upgrade the OpenSSL:
$ sudo port selfupdate
$ sudo port upgrade oppenssl
MyMac:~ Myself$ sudo port upgrade openssl 
--->  Computing dependencies for openssl
--->  Fetching archive for openssl
--->  Attempting to fetch openssl-1.0.1g_0.darwin_13.x86_64.tbz2 from http://nue.de.packages.macports.org/macports/packages/openssl
--->  Attempting to fetch openssl-1.0.1g_0.darwin_13.x86_64.tbz2.rmd160 from http://nue.de.packages.macports.org/macports/packages/openssl
--->  Installing openssl @1.0.1g_0
--->  Cleaning openssl
--->  Computing dependencies for openssl
--->  Deactivating openssl @1.0.1f_0
--->  Cleaning openssl
--->  Activating openssl @1.0.1g_0
--->  Cleaning openssl
--->  Updating database of binaries: 100.0%
--->  Scanning binaries for linking errors: 100.0%

--->  No broken files found.

Now we can check again our version to be sure that we have an updated openssl version:

MyMac:~ Myself$ openssl version -a
OpenSSL 1.0.1g 7 Apr 2014

Ubuntu:

$ sudo apt-get update
$ sudo apt-get upgrade
$ openssl version -a

CentOS/Fedora

$ sudo yum -y install openssl
$ openssl version -a

Hope help!

No comments:

Post a Comment