sshd & [USN-2459-1] OpenSSL vulnerabilities

William Scott Lockwood III scott at guppylog.com
Tue Jan 13 12:39:43 UTC 2015


On Jan 13, 2015 6:27 AM, "Vangelis Katsikaros" <ibob17 at yahoo.gr> wrote:
>
> Hi
>
>
> On 01/13/2015 02:06 PM, Colin Law wrote:
>>
>> On 13 January 2015 at 11:42, Vangelis Katsikaros <ibob17 at yahoo.gr> wrote:
>>>
>>> Hi
>>>
>>> Sorry in case the question is stupid :) Does the ssh service need a
restart
>>> after this update?
>>
>>
>> An update to any service should normally restart it automatically.  If
>> in doubt just restart it anyway.
>
>
> Thanks for the info. However:
> - The update in this case is not for the service openssh-server (the
service), it's for libssl, and from the output I don't see that it
triggered any restarts.
> - I know I can restart the service, but I don't want to do this without a
reason to a 20+ VMs.
>
> Regards
> Vangelis

Yes, you need to restart. SSHD loads libssl into memory at launch. Patching
it doesn't reload the patched version. You are vulnerable until you restart.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20150113/f53a2b11/attachment.html>


More information about the ubuntu-users mailing list