[Security Notice] How the Heartbleed bug affects SCS computing
As a part of our commitment to security, SCS Computing Facilities is responding to the recently announced Heartbleed vulnerability (http://www.heartbleed.com).
SCS core services were not affected by the "Heartbleed" bug. The hosts providing services such as the Instance Manager and SCS WebISO services were not affected by this vulnerability. As a result, you do NOT need to reset your SCS passwords.
Ubuntu 12.04 LTS computers installed by SCS Computing Facilities should have had a patch for this vulnerability applied on or before Tuesday, April 8th, 2014. SSL-enabled network services may need to be restarted before this patch takes effect.
Fedora hosts installed by SCS Computing Facilities run a version of OpenSSL that does not have this vulnerability.
In addition, we have scanned the SCS wired network for vulnerable hosts. The contacts for any vulnerable hosts have been notified. We will be doing additional follow-up scans and notifying contacts for hosts that may have been affected by this vulnerability before it was announced.
Please contact the SCS Help Desk at x8-4231 or email@example.com with any questions or concerns regarding this vulnerability.