The OpenSSL Project announced on Thursday that it’s preparing patches for several vulnerabilities affecting the crypto library.
OpenSSL versions 1.0.2h and 1.0.1t will be released on May 3 between 12:00 and 15:00 UTC. These releases will patch several flaws, including ones rated “high severity.”
Issues that have a high severity rating affect less common configurations or are less likely to be exploitable. The OpenSSL Project has been trying to fix these types of security holes within one month.
OpenSSL versions 1.0.0 and 0.9.8 are no longer supported and they will not receive any security updates. Support for version 1.0.1 will end on December 31, 2016.
This will be the third round of OpenSSL updates released this year. In January, the OpenSSL Project released versions 1.0.2f and 1.0.1r to address a high severity flaw that allows attackers to obtain information that can be used to decrypt secure traffic, and a low severity SSLv2 cipher issue.
Updates released in March resolved several low, medium and high severity vulnerabilities, including “DROWN,” a serious flaw that can be exploited to crack encrypted communications. DROWN affected a quarter of the top one million HTTPS domains and one-third of all HTTPS websites at the time of disclosure.