Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New CVE has come up for OpenSSL >= 3.0 (note we use openssl 1.x today) #17

Open
MikeFultonDev opened this issue Oct 31, 2022 · 4 comments

Comments

@MikeFultonDev
Copy link
Contributor

MikeFultonDev commented Oct 31, 2022

Note: this does not affect us yet because we are porting 1.x and not 3.x:

See: CVE for starter information
@IgorTodorovskiIBM @ejratl fyi

@IgorTodorovskiIBM
Copy link
Collaborator

Should we eventually move up to openssl 3.0? We're currently building off of Openssl 1.1, which I believe is not affected.

@MikeFultonDev
Copy link
Contributor Author

Yeah - good point - I didn't realize when I opened this, that we were 1.x

@MikeFultonDev MikeFultonDev changed the title Incorporate security vulnerability into openssl and rebuild dependent projects New CVE has come up for OpenSSL >= 3.0 (note we use openssl 1.x today) Oct 31, 2022
@v1gnesh
Copy link
Contributor

v1gnesh commented May 16, 2023

Was looking this up and found a reason for us to maybe switch to 3.x:

https://www.openssl.org/source/

Note: The latest stable version is the 3.1 series supported until 14th March 2025. Also available is the 3.0 series which is a Long Term Support (LTS) version and is supported until 7th September 2026. The previous LTS version (the 1.1.1 series) is also available and is supported until 11th September 2023. All older versions (including 1.1.0, 1.0.2, 1.0.0 and 0.9.8) are now out of support and should not be used. Users of these older versions are encouraged to upgrade to 3.1 or 3.0 as soon as possible. Extended support for 1.0.2 to gain access to security fixes for that version is available.

@IgorTodorovskiIBM
Copy link
Collaborator

Thanks @v1gnesh , we may want to consider dropping support for OpenSSL 1.1 if the projects that are dependent on openssl continue to work with Openssl 3.0 - https://github.com/ZOSOpenTools/meta/blob/main/docs/Progress.md#projects-with-the-most-dependencies and OpenSSL 3's API is mostly compatible with OpenSSL 1.1.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants