Announcement

Collapse
No announcement yet.

OpenSSL Hit By New High Severity Security Issue

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • OpenSSL Hit By New High Severity Security Issue

    Phoronix: OpenSSL Hit By New High Severity Security Issue

    OpenSSL has been hit by another "high" severity security vulnerability...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    I'm sure this hits some people but most are still on OpenSSL 1.02, even many rolling distros like Arch.

    Comment


    • #3
      I guess it's time for a new fork...

      Comment


      • #4
        I think openssl 1.1 is on Arch Linux's todo list.
        I personally think it will need work as it touches curl and hence pacman.

        Edit: I wish they would migrate curl and its dependent packages to use nss instead of openssl. Fedora does so already if I understand correctly.

        Comment


        • #5
          We need a new modern suite that is written in Rust and only supports TLS 1.3 with no support for TLS 1.0-1.2 or SSL. No support for MD5 or SHA-1, etc. Minimal, robust, secure.

          Comment


          • #6
            We need to replace this faulty SSL stuff. I propose hiring a legion of Navajo code talkers.

            Comment


            • #7
              We need to go back to DOS and serial null-modem connections.

              Comment


              • #8
                Originally posted by devius View Post
                We need to go back to DOS and serial null-modem connections.
                Ah, the good old times..

                Comment


                • #9
                  Can anyone tell if LibreSSL is/was vulnerable? Although, if this was only introduced with 1.1 then I would guess not...

                  Comment


                  • #10
                    It'll be interesting to see if LibreSSL (by OpenBSD team) or BoringSSL (by Google) will be affected by this issue too.

                    Comment

                    Working...
                    X