Extreme Networks update on the OpenSSL vulnerability called “Heartbleed"
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
04-12-2014 03:07 AM
Patches will be available for all affected products by Monday (4/14). Reference Extreme Network CERT VU#720951 Vulnerability Advisory note for additional details. http://learn.extremenetworks.com/rs/extreme/images/CERT_VU%23720951_Vulnerability_Advisory_04_11_201...
18 REPLIES 18
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
04-16-2014 12:27 PM
This information was added yesterday to the end of the NetSight Patch readme file, in the copy that is accessible from the end of the "Article ID: 16131" as both embedded and hyperlinked above:
The last time I checked (yesterday), it had not yet been added to the copy out on the NMS Product page.
code:
Optional verification of results:
code:
In 'dpkg -l | grep ssl' command output, the "libssl1.0.0" and "openssl" packages should display version "1.0.1-4ubuntu5.12" if the patch has been successfully applied.
The last time I checked (yesterday), it had not yet been added to the copy out on the NMS Product page.
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
04-16-2014 12:27 PM
Thanks, Paul.
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
04-16-2014 07:31 AM
Hi
After patch the NetSight, how can I make sure the bug has been fixed?
Thanks.
Kevin
After patch the NetSight, how can I make sure the bug has been fixed?
Thanks.
Kevin
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
04-14-2014 05:28 PM
This reply was created from a merged topic originally titled heartbleed OpenSSL vulnerability. Does anyone have any information on whether or not and which Enterasys or Extreme products are affected by this vulnerability?
