TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Withdrawal of OpenSSL 3.0.6 and 1.1.1r

107 pointsby TimWollaover 2 years ago

6 comments

frankjrover 2 years ago
Vote to stop shipping 3.0.6 and 1.1.1r (<a href="https:&#x2F;&#x2F;github.com&#x2F;openssl&#x2F;general-policies&#x2F;pull&#x2F;32" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;openssl&#x2F;general-policies&#x2F;pull&#x2F;32</a>)<p>- Regression: X509_sign, etc., no longer implicitly refresh the cached TBSCertificate (<a href="https:&#x2F;&#x2F;github.com&#x2F;openssl&#x2F;openssl&#x2F;issues&#x2F;19388" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;openssl&#x2F;openssl&#x2F;issues&#x2F;19388</a>)<p>- PKCS12_parse leaves errors on stack [3.0.6] (<a href="https:&#x2F;&#x2F;github.com&#x2F;openssl&#x2F;openssl&#x2F;issues&#x2F;19389" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;openssl&#x2F;openssl&#x2F;issues&#x2F;19389</a>)
bombcarover 2 years ago
3.0.6 was released 3 days ago: <a href="https:&#x2F;&#x2F;mta.openssl.org&#x2F;pipermail&#x2F;openssl-announce&#x2F;2022-October&#x2F;000235.html" rel="nofollow">https:&#x2F;&#x2F;mta.openssl.org&#x2F;pipermail&#x2F;openssl-announce&#x2F;2022-Octo...</a> and apparently had &quot;Fix for custom ciphers to prevent accidental use of NULL encryption ([CVE-2022-3358])&quot;<p><a href="https:&#x2F;&#x2F;www.openssl.org&#x2F;news&#x2F;vulnerabilities.html#CVE-2022-3358" rel="nofollow">https:&#x2F;&#x2F;www.openssl.org&#x2F;news&#x2F;vulnerabilities.html#CVE-2022-3...</a><p>1.1.1r was &quot;Added a missing header for memcmp that caused compilation failure on some platforms&quot;
评论 #33178555 未加载
评论 #33178694 未加载
Felgerover 2 years ago
Good news. I observed those AES cipher&#x2F;lz2-v2 issues with dead tunnels on newer builds of OpenVPN, on i5-8265u CPU but not on R5 3600. Had to rollback on a previous release.
TillEover 2 years ago
Another W for my habit of not upgrading our application&#x27;s embedded OpenSSL library until there&#x27;s an actual relevant security bug fix.<p>We also dodged the serious bug introduced in 3.0.4 that way.
remramover 2 years ago
Does the rule about versioning still hold? Are they still blowing smoke in everyone&#x27;s eye and keeping their security audit&#x27;s results by incrementing a sub-patch letter in their version number, even though they make major breaking changes between each release?<p>The other day my cluster went down because the rules for &quot;self-signed certificates&quot; changed between releases, and a certificate signed by a different CA with a similar Common Name was now rejected as &quot;self-signed&quot; by the client library.<p>What&#x27;s the point of suffering a naming scheme this silly if we can expect major breakage between each release anyway?
nwmcsweenover 2 years ago
Is there a reason LibreSSL seems less bumpy than a multicorp sponsored OpenSSL? Is it just more development takes place in OpenSSL vs LibreSSL?