TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Patch OpenSSL on November 1 to avoid “critical” security vulnerability

201 pointsby bjokoover 2 years ago

14 comments

jrootabegaover 2 years ago
Here&#x27;s the official place where these are announced, if you feel a little uneasy getting urgent security advisories from tweets and blogs:<p><a href="https:&#x2F;&#x2F;mta.openssl.org&#x2F;mailman&#x2F;listinfo&#x2F;openssl-announce" rel="nofollow">https:&#x2F;&#x2F;mta.openssl.org&#x2F;mailman&#x2F;listinfo&#x2F;openssl-announce</a>
评论 #33383631 未加载
评论 #33384219 未加载
sullivanmattover 2 years ago
Ubuntu 22.04 &amp; RHEL 9 are the major distros impacted. Docker images built on ubuntu:latest will also be impacted. The latest releases of Alpine&#x2F;Debian&#x2F;AL2 are all not impacted, they use 1.1.x lineage.
评论 #33381649 未加载
评论 #33381559 未加载
评论 #33383418 未加载
评论 #33383370 未加载
mmweltover 2 years ago
&gt; And by widely leveraged, I mean almost completely ubiquitous, if you’re using HTTPS, chances are you’re using OpenSSL. Almost everyone is.<p>This is probably a bit of an exaggeration. There are quite a few other SSL implementations that actually are also &quot;widely leveraged&quot;[1]. In particular, LibreSSL was forked and cleaned up after Heartbleed. Google uses BoringSSL. GnuTLS is widely used and unrelated to OpenSSL.<p>[1] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Comparison_of_TLS_implementations" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Comparison_of_TLS_implementati...</a>
评论 #33381134 未加载
评论 #33381148 未加载
评论 #33381721 未加载
fh973over 2 years ago
Couldn&#x27;t they be a bit more specific? No software uses all of openssl, there is software that uses it for other things than server-side TLS.
评论 #33381657 未加载
评论 #33381564 未加载
s-mackeover 2 years ago
When I execute an ldd at &#x2F;usr&#x2F;bin&#x2F;ssh I get<p><pre><code> libssl.so.10 =&gt; &#x2F;lib64&#x2F;libssl.so.10 libssl3.so =&gt; &#x2F;lib64&#x2F;libssl3.so libnss3.so =&gt; &#x2F;lib64&#x2F;libnss3.so </code></pre> What puzzles me is that I am using libssl.so.10 and libssl3.so at the same time. libssl3.so belongs to the nss package and not to the openssl package. Am I affected?
评论 #33384966 未加载
评论 #33382466 未加载
jbverschoorover 2 years ago
What&#x27;s the &#x27;best&#x27; way to find out if there are binaries in which libssl is statically linked?
评论 #33382518 未加载
评论 #33383474 未加载
saurikover 2 years ago
Previously:<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=33330752" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=33330752</a><p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=33364183" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=33364183</a>
rasculover 2 years ago
This is basically useless without identifying the vulnerability.
评论 #33383998 未加载
评论 #33382765 未加载
eastboundover 2 years ago
November 1st is a bank holiday in France, so a lot of sysadmins won’t be happy and systems will be vulnerable.
评论 #33381595 未加载
评论 #33383380 未加载
评论 #33385733 未加载
评论 #33381308 未加载
评论 #33386474 未加载
charcircuitover 2 years ago
Does anyone have a fix for this so I&#x27;m not vulnerable for the next week?
sylwareover 2 years ago
Does libressl have this vulnerability?
Gigachadover 2 years ago
How many times does this have to happen before we start rejecting components written in unsafe languages?
评论 #33381122 未加载
评论 #33382671 未加载
评论 #33381767 未加载
评论 #33380989 未加载
评论 #33383173 未加载
评论 #33383537 未加载
评论 #33381217 未加载
评论 #33382320 未加载
Genghis_9000over 2 years ago
when will browsers learn and just replace ssl&#x2F;tls with one line of code to verify that the public key portion of the URL matches the session established by the website? C is only a hundredth of the problem here (that 100th is still big). its ironic that this news was brought to us by a scammer&#x27;s corporate blog
评论 #33385995 未加载
frankjrover 2 years ago
This is supposedly the commit which fixes the bug <a href="https:&#x2F;&#x2F;github.com&#x2F;openssl&#x2F;openssl&#x2F;commit&#x2F;3df6aed7826640d944da382f78af5ab87ea790db" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;openssl&#x2F;openssl&#x2F;commit&#x2F;3df6aed7826640d944...</a>
评论 #33382869 未加载
评论 #33382684 未加载
评论 #33382592 未加载
评论 #33384173 未加载