Nessus is labeling the severity as medium
Dr Paul Dale
pauli at openssl.org
Tue Apr 4 23:06:19 UTC 2023
I was discussing CVE-2023-0466 which seemed to be the relevant one.
Looking again, the table you included isn't overly clear (to me at
least) what it's referring to.
Dr Paul Dale
On 5/4/23 09:02, Dr Paul Dale wrote:
> We do not have a firm release date for 1.1.1u at this point. As per
> our policy, LOW severity CVE are not release triggering and this one
> is considered LOW severity by the project. Baring other
> eventualities, three months is a likely time frame.
>
> I'll note that the issue here was in the documentation and that the
> fix is purely a documentation change. This change is already
> available online on our web site:
>
> https://www.openssl.org/docs/man1.1.1/man3/X509_VERIFY_PARAM_set_flags.html
>
>
> Dr Paul Dale
>
> On 4/4/23 23:16, Joslin, Jack via openssl-users wrote:
>> Hello,
>>
>> When will OpenSSL 1.1.1u be released?
>>
>> Tenable indicates the vulnerability severity of 1.1.1t as medium. I
>> found this post indicating that there is no ETA on the release of
>> OpenSSL 1.1.1u and that it may not be released for 3 months.
>>
>> OpenSSL Security Advisory
>> <https://mta.openssl.org/pipermail/openssl-users/2023-March/016106.html>
>>
>> From Nessus/Tenable scan:
>>
>> Plugin Plugin Name Severity Plugin Output Solution Risk Factor CVE
>> 173260 OpenSSL 1.1.1 < 1.1.1u Multiple Vulnerabilities Medium
>> Plugin Output:
>> Banner: Apache/2.4.56 (Unix) OpenSSL/1.1.1t mod_perl/2.0.9 Perl/v5.8.8
>> Reported version : 1.1.1t
>> Fixed version: 1.1.1u Upgrade to OpenSSL version 1.1.1u or later.
>> Medium CVE-2023-0464, CVE-2023-0464, CVE-2023-0465, CVE-2023-0466
>>
>>
>> Regards,
>> Jack Joslin
>>
>> Business Services Outsourcing Center (BSOC)
>>
>> General Dynamics, Information Technology
>>
>> 327 Columbia Turnpike, Rensselaer, NY 12144
>>
>> jack.joslin at gdit.com
>>
>> m: +1.321.431.5117
>>
>> Follow us on Facebook <http://www.facebook.com/OfficialCSRA> |
>> Twitter <http://www.twitter.com/csra_inc> | LinkedIn
>> <http://www.linkedin.com/company/csra_inc>
>>
>> This electronic message transmission contains information from GDIT
>> which may be attorney-client privileged, proprietary or confidential.
>> The information in this message is intended only for use by the
>> individual(s) to whom it is addressed. If you believe you have
>> received this message in error, please contact me immediately and be
>> aware that any use, disclosure, copying or distribution of the
>> contents of this message is strictly prohibited. NOTE: Regardless of
>> content, this e-mail shall not operate to bind GDIT to any order or
>> other contract unless pursuant to explicit written agreement or
>> government initiative expressly permitting the use of e-mail for such
>> purpose
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mta.openssl.org/pipermail/openssl-users/attachments/20230405/9fcbe185/attachment.htm>
More information about the openssl-users
mailing list