You probably have "/usr/local/ssl/bin/openssl" instead of overwriting /usr/bin/openssl.
You can also use /usr/local for prefix instead, but you would need to adjust your path accordingly if that is not already on your path.
The Common Vulnerabilities and exposures project identifies the following issues: It is not bad as the heartbleed openssl bug disclosed in April 2014 in the Open SSL cryptography library.
But, new bug can cause “Denial of Service” and crash your services.
cd /usr/src wget tar -zxf openssl-1.0.1gz cd openssl-1.0.1g ./config make make test make install cd /usr/src rm -rf openssl-1.0.1gz rm -rf openssl-1.0.1g Try this config line instead to overwrite the default.
It installs to prefix /usr/local/ssl by default in your setup when you leave off the prefix.
You will also need to reinstall any dependencies you had already installed.Here is the INSTALL documentation: $ ./config $ make $ make test $ make install [If any of these steps fails, see section Installation in Detail below.] This will build and install Open SSL in the default location, which is (for historical reasons) /usr/local/ssl.If you want to install it anywhere else, run config like this: $ ./config --prefix=/usr/local --openssldir=/usr/local/openssl by Red Hat for Enterprise Linux see, and this is therefore the official fix that Cent OS ships.The attacker would be required to intercept and alter network traffic, and do so in real time, to exploit the flaw; in that case, the attacker could potentially view and/or modify the otherwise secured traffic.In this case, 1.0.1e 16.el6_5.7 is vulnerable, and we’ll want to patch the server.