I have downloaded and applied the security updates as outlined below:
"Scope
Updates have been released for the following versions of the SMEServer
SMEServer version 5.5
SMEServer version 5.1.2
SMEServer version 5.1.1
SMEServer version 5.0
These updates address the following security issue
Remotely-exploitable denial of service attack in ASN1 libraries in the OpenSSL cryptographic libraries (CAN-2002-0659). A detailed advisory is located at
http://rhn.redhat.com/errata/RHSA-2002-160.html"
Here is a transcript of my session:
[root@SME1 updates]# rpm -Uvh --replacepkgs *.rpm
Preparing... ########################################### [100%]
1:apache ########################################### [ 7%]
2:libtool-libs ########################################### [ 15%]
3:libxml2 ########################################### [ 23%]
4:openssl ########################################### [ 30%]
5:openssh ########################################### [ 38%]
6:openssh-clients ########################################### [ 46%]
7:openssh-server ########################################### [ 53%]
8:pspell ########################################### [ 61%]
9:php ########################################### [ 69%]
10:php-imap ########################################### [ 76%]
11:php-ldap ########################################### [ 84%]
12:php-mysql ########################################### [ 92%]
Stopping sshd:[ OK ]
Starting sshd:[ OK ]
[root@SME1 updates]# /sbin/e-smith/signal-event post-upgrade
/var/tmp/rpm-tmp.52921: /etc/rc7.d/S86httpd-admin: No such file or directory
/var/tmp/rpm-tmp.52921: /etc/rc7.d/S85httpd-e-smith: No such file or directory
Two questions:
1. Are the two error messages a problem?
2. How can I tell if my system has been compromised prior to applying the update?