How to patch OpenSSL’s Heartbleed Vulnerability
First you need to understand that not all version of OpenSSL are vulnerable.
Below are the version of OpenSSL that are affected by this bug.
CentOS / Red Hat Enterprise Linux / Ubuntu
• OpenSSL 1.0.1 and 1.0.2-beta
The following versions are NOT affected by this bug.
• OpenSSL 1.0.0 branch is NOT vulnerable
• OpenSSL 0.9.8 branch is NOT vulnerable
Therefore, if you are running CentOS 5.x / RHEL 5.x / Ubuntu 10.04 LTS then you will be running an older version of OpenSSL which does not have the bug.
However, if you are running CentOS 6.x / RHEL 6.x / Ubuntu 12.04 LTS then you will need to immediately update the OpenSSL version to the following:
CentOS 6.x / RHEL 6.x
• OpenSSL 1.0.1e-16.el6_5.7.x86_64
Ubuntu 12.0.4 LTS
• OpenSSL 1.0.1-4ubuntu5.12
Upgrading OpenSSL for CentOS 6.x / RHEL 6.x
Verify the version of OpenSSL is installed on the server:
# rpm -qa | grep openssl
If the version is anything other than OpenSSL 1.0.1e-16.el6_5.7.x86_64 then perform the upgrade below:
# yum update openssl
Then verify the OpenSSL version again.
# rpm -qa | grep openssl
openssl-1.0.1e-16.el6_5.7.x86_64
Upgrading OpenSSL for Ubuntu 12.04 LTS
Verify the version of OpenSSL is installed on the server:
# dpkg -l | grep openssl
If the version is anything other than OpenSSL 1.0.1-4ubuntu5.12 then perform the upgrade below:
# sudo apt-get update
# sudo apt-get install openssl libssl1.0.0
Then verify the OpenSSL version again.
# dpkg -l | grep openssl
openssl 1.0.1-4ubuntu5.12