On 03/30/2015 11:57 PM, Venkateswara Rao Dokku wrote:
> just for my curiosity, How can we make sure that its not affected?
>
> Is there any script to check whether its vulnerable or not (as in bash
> shell shock vulnerability test)?
You can run both client and server tests from:
https://www.ssllab
Well, read article from: https://access.redhat.com/articles/1384453
Anyway, If You are really running centos 5.5 then you are missing more
important security patches and you should immediately update to latest
version 5.11
--
Eero
2015-03-31 9:57 GMT+03:00 Venkateswara Rao Dokku :
> just for m
just for my curiosity, How can we make sure that its not affected?
Is there any script to check whether its vulnerable or not (as in bash
shell shock vulnerability test)?
On Tue, Mar 31, 2015 at 12:25 PM, Eero Volotinen
wrote:
> Centos 5 is not affected by this bug, so fix is not available.
>
>
Centos 5 is not affected by this bug, so fix is not available.
Eero
31.3.2015 9.48 ap. kirjoitti "Venkateswara Rao Dokku" :
> Hi All,
>
> I wanted to fix the openssl vulnerabilities (CVE-2014-3569, CVE-2014-3570,
> CVE-2014-3571, CVE-2014-3572) in my CentOS 5.5 and found out that 0.9.8zd
> has th
Hi All,
I wanted to fix the openssl vulnerabilities (CVE-2014-3569, CVE-2014-3570,
CVE-2014-3571, CVE-2014-3572) in my CentOS 5.5 and found out that 0.9.8zd
has the fixes I am looking for (from the
https://www.openssl.org/news/vulnerabilities.html link).
But, When I tried to find the openssl-0.9.
5 matches
Mail list logo