Last active
September 2, 2015 20:31
-
-
Save jacksoncage/10104261 to your computer and use it in GitHub Desktop.
HeartBleed-Debian-Wheezy-Update-OpenSSL-1.0.1e-2+deb7u4.sh
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Debian Wheezy - Fixing HeartBleed | |
# Installing 1.0.1e-2+deb7u4 | |
# http://www.corsac.net/?rub=blog&post=1565 | |
# https://security-tracker.debian.org/tracker/DSA-2896-1 | |
# | |
# As pointed out, not the best secured way but fast. Please use 'apt-get && apt-get upgrade' for a more secure system. | |
MACHINE_TYPE=`uname -m` | |
if [ ${MACHINE_TYPE} == 'x86_64' ]; then | |
wget http://security.debian.org/pool/updates/main/o/openssl/libssl1.0.0-dbg_1.0.1e-2+deb7u5_amd64.deb | |
wget http://security.debian.org/pool/updates/main/o/openssl/openssl_1.0.1e-2+deb7u5_amd64.deb | |
wget http://security.debian.org/pool/updates/main/o/openssl/libssl1.0.0_1.0.1e-2+deb7u5_amd64.deb | |
wget http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_1.0.1e-2+deb7u5_amd64.deb | |
dpkg -i openssl_1.0.1e-2+deb7u5_amd64.deb | |
dpkg -i libssl1.0.0_1.0.1e-2+deb7u5_amd64.deb | |
dpkg -i libssl1.0.0-dbg_1.0.1e-2+deb7u5_amd64.deb | |
dpkg -i libssl-dev_1.0.1e-2+deb7u5_amd64.deb | |
else | |
wget http://security.debian.org/pool/updates/main/o/openssl/libssl1.0.0-dbg_1.0.1e-2+deb7u5_i386.deb | |
wget http://security.debian.org/pool/updates/main/o/openssl/openssl_1.0.1e-2+deb7u5_i386.deb | |
wget http://security.debian.org/pool/updates/main/o/openssl/libssl1.0.0_1.0.1e-2+deb7u5_i386.deb | |
wget http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_1.0.1e-2+deb7u5_i386.deb | |
dpkg -i openssl_1.0.1e-2+deb7u5_i386.deb | |
dpkg -i libssl1.0.0_1.0.1e-2+deb7u5_i386.deb | |
dpkg -i libssl1.0.0-dbg_1.0.1e-2+deb7u5_i386.deb | |
dpkg -i libssl-dev_1.0.1e-2+deb7u5_i386.deb | |
fi | |
/etc/init.d/nginx restart | |
/etc/init.d/ssh restart |
For 32bit machines
wget http://security.debian.org/pool/updates/main/o/openssl/libssl1.0.0-dbg_1.0.1e-2+deb7u5_i386.deb
wget http://security.debian.org/pool/updates/main/o/openssl/openssl_1.0.1e-2+deb7u5_i386.deb
wget http://security.debian.org/pool/updates/main/o/openssl/libssl1.0.0_1.0.1e-2+deb7u5_i386.deb
wget http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_1.0.1e-2+deb7u5_i386.deb
dpkg -i openssl_1.0.1e-2+deb7u5_i386.deb
dpkg -i libssl1.0.0_1.0.1e-2+deb7u5_i386.deb
dpkg -i libssl1.0.0-dbg_1.0.1e-2+deb7u5_i386.deb
dpkg -i libssl-dev_1.0.1e-2+deb7u5_i386.deb
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
@dnet Hard time demands for fast solutions. But yes, not the most safe way.
@AlucardZweo apt-get repos wasn't up to dated when I fixed my servers.