Security Experts:

OpenSSL to Patch High Severity Vulnerabilities

The OpenSSL Project announced on Thursday that it’s preparing patches for several vulnerabilities affecting the crypto library.

OpenSSL versions 1.0.2h and 1.0.1t will be released on May 3 between 12:00 and 15:00 UTC. These releases will patch several flaws, including ones rated “high severity.”

Issues that have a high severity rating affect less common configurations or are less likely to be exploitable. The OpenSSL Project has been trying to fix these types of security holes within one month.

OpenSSL versions 1.0.0 and 0.9.8 are no longer supported and they will not receive any security updates. Support for version 1.0.1 will end on December 31, 2016.

This will be the third round of OpenSSL updates released this year. In January, the OpenSSL Project released versions 1.0.2f and 1.0.1r to address a high severity flaw that allows attackers to obtain information that can be used to decrypt secure traffic, and a low severity SSLv2 cipher issue.

Updates released in March resolved several low, medium and high severity vulnerabilities, including “DROWN,” a serious flaw that can be exploited to crack encrypted communications. DROWN affected a quarter of the top one million HTTPS domains and one-third of all HTTPS websites at the time of disclosure.

Related: DROWN Vulnerability Still Unpatched by Most Cloud Services

Related: Several Vulnerabilities Patched in NTP Daemon

view counter
Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.