[TriLUG] openssl bug
Greg Brown
gregbrown at mindspring.com
Tue Sep 17 23:43:55 EDT 2002
Some time ago, Jon burst forth this utterance:
Okay folks, check your Apache webservers running mod_ssl and make sure
they up-to-date (version greater than 0.9.6d). There's a new bug in
town and it breaks into Apache via a vulnerability in mod_ssl.
Jon
I have a question. When I read this I just shut down my web server as
I didn't have time to patch it (still working the 80+ work weeks).
Anyway, here's the history:
I was running openssl-0.9.6.3.
I downloaded the latest RPM from Red Hat for my distro (7.1) which was
the following file:
openssl-0.9.6-13.i386.rpm
rpm -U --test openssl-0.9.6-13.i386.rpm showed no errors so I upgraded
Now my rpm -qa | grep ssl shows:
openssl-0.9.6-13
Looking into more detail about the version (rpm -qi this time) I see
the following:
Name : openssl Relocations: (not
relocateable)
Version : 0.9.6 Vendor: Red Hat, Inc.
Release : 13 Build Date: Thu 01 Aug 2002
02:57:06
Looking at the release date I'd say that it's fairly impossible that
this is going to fix any bugs discovered after August, 01, 2002.
Correct?
So my website is still down (not a big deal, really) but I would like
to get it back up and running sometime..
What is the process that Red Hat uses to update the RPMs at
ftp://updates.redhat.com? When a bug is discovered how long does it
take for an updated RPM to appear or am I expected to download the
source and compile it myself. Not a big deal really, and maybe I'm
missing something as I've been awake for too long but am I wrong in
assuming that I'm still at risk with this bug? And how long until I
can expect an updated rpm from Red Hat?
And does anyone have a URL which details the process of how bugs are
fixed and added to RPMs?
Thanks!
Greg
More information about the TriLUG
mailing list