> This issue was found by Bernd Edlinger and reported to OpenSSL on 7th April
2020. It was found using the new static analysis pass being implemented in GCC,
-fanalyzer.
2 week turnaround time, not bad I guess, for something found by a static analyzer.
This is a good question. Also important to remember is that for many Linux distributions dynamically linked OpenSSL artifacts are what end up getting used by the vast majority of binaries.
I suppose so, but this bug only allows to crash the application. No doubt OpenSSL is buggy, but its problem is that a lot of applications depend on it as well.
I'm hoping it will eventually reach status of bind or sendmail, they had also very bad track record, but vulnerabilities now are quite rare.
This would primarily affect web servers exposing SSH access to the public right? I suppose it also affects internally accessible servers as well but to a lesser degree in terms of priority.
OpenSSL is the culprit of a MacPort installation issue (vde2) for which there is no maintainer. It exposes operational vulnerability to unmaintained open source software.
LibreSSL has all of the same problems as OpenSSL. It's just a fork from an earlier point in time before OpenSSL did it's big rewrite that came with OpenSSL 1.1.1.
I gather that LibreSSL has an (unintended) OpenSSL dependency?
"LibreSSL is composed of four parts:
- The openssl(1) utility, which provides tools for managing keys, certificates, etc.
- libcrypto: a library of cryptography fundamentals
- libssl: a TLS library, backwards-compatible with OpenSSL
- libtls: a new TLS library, designed to make it easier to write foolproof application"
9wzYQbTYsAIc|5 years ago
2 week turnaround time, not bad I guess, for something found by a static analyzer.
judge2020|5 years ago
nayuki|5 years ago
erichdongubler|5 years ago
AngeloR|5 years ago
pmorici|5 years ago
Shorel|5 years ago
pronoiac|5 years ago
lvs|5 years ago
agumonkey|5 years ago
codewiz|5 years ago
ccktlmazeltov|5 years ago
usr1106|5 years ago
a) used
b) enabled in either client or server?
nayuki|5 years ago
takeda|5 years ago
I'm hoping it will eventually reach status of bind or sendmail, they had also very bad track record, but vulnerabilities now are quite rare.
stuff4ben|5 years ago
detaro|5 years ago
vladsanchez|5 years ago
geofft|5 years ago
If you want to use unmaintained software, you know OpenSSL 1.0 still exists in this world, right?
saagarjha|5 years ago
Avamander|5 years ago
snvzz|5 years ago
In a sane world, everybody would have switched to libressl ages ago.
pnako|5 years ago
Void is considering switching back too: https://github.com/void-linux/void-packages/issues/20935
mlindner|5 years ago
vladsanchez|5 years ago
"LibreSSL is composed of four parts:
- The openssl(1) utility, which provides tools for managing keys, certificates, etc. - libcrypto: a library of cryptography fundamentals - libssl: a TLS library, backwards-compatible with OpenSSL - libtls: a new TLS library, designed to make it easier to write foolproof application"
:shrug: