<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why is OPENSSL vulnerability still showing in latest release? in Security</title>
    <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/688961#M17900</link>
    <description>&lt;P&gt;Yes and no. I guess my question could have been a bit more concrete and clear.&lt;/P&gt;&lt;P&gt;It does list the details regarding premium services (&lt;A href="https://www.openssl.org/support/contracts.html#premium" target="_blank"&gt;[ Contracts ] - /support/contracts.html (openssl.org)&lt;/A&gt;) inkluding LTS for 1.0.2.&lt;/P&gt;&lt;P&gt;But it does not list any premium customers. I'm struggling to validate that the LTS versions is what is shipped with Splunk. I have not found&amp;nbsp; information documenting this as a fact by Splunk representatives yet.&lt;/P&gt;&lt;P&gt;If you can point me to the documentation regaring Splunk being a premium customer I'd appreciate it very much. Then I have something to lean on while ignoring the alerts &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 29 May 2024 08:31:53 GMT</pubDate>
    <dc:creator>fatsug</dc:creator>
    <dc:date>2024-05-29T08:31:53Z</dc:date>
    <item>
      <title>Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/653720#M17191</link>
      <description>&lt;P&gt;Greetings,&lt;/P&gt;
&lt;P&gt;We started seeing OPSNSSL vulnerabilities on all of our Splunk forwarders and the main engine this week. The advisory tells us we must use OPENSSL 3.0.8 or newer. Since OPENSSL is now on 3.1.2, I really thought the latest Splunk updates would fix the problem. I have just updated all forwarders to 9.1.0.1 and the main engine to 9.1.0.2, and it is now showing OPENSSL at 3.0.7. When will Splunk issue an update to address this and get OPENSSL to at least 3.0.8?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Aug 2023 16:30:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/653720#M17191</guid>
      <dc:creator>tsondo</dc:creator>
      <dc:date>2023-08-09T16:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655140#M17216</link>
      <description>&lt;P&gt;I'm getting punked for this from our Vuln.mgt team too. They refer to a "&amp;nbsp;&lt;A href="https://www.tenable.com/cve/CVE-2023-3446" target="_blank" rel="noopener"&gt;CVE-2023-3446&lt;/A&gt;&amp;nbsp;- OpenSSL 1.0.2 &amp;lt; 1.0.2zi Vulnerability".&amp;nbsp;&lt;BR /&gt;Apparently, there's a file '/opt/splunk/lib/libcrypto.so.1.0.0' that existed for years, that all of a sudden is a problem to Nessus - but I can't find anything about it from Splunk?&lt;/P&gt;&lt;P&gt;I just tried to do an upgrade all the way from 6.5.2 to 9.1.0.2, but nothing changes - except the timestamp on the file.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 09:23:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655140#M17216</guid>
      <dc:creator>ClausBom</dc:creator>
      <dc:date>2023-08-22T09:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655152#M17217</link>
      <description>&lt;P&gt;If no one from Splunk chimes in with an expected patch date I will put in an official ticket. I would hope that a vulnerability listed as severe would have their full attention by now.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 10:44:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655152#M17217</guid>
      <dc:creator>tsondo</dc:creator>
      <dc:date>2023-08-22T10:44:07Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655511#M17221</link>
      <description>&lt;P&gt;did anybody ever get an answer on this? i can also put a ticket in but im being hounded by security team to get this looked at. nessus is also the tool they're using to complain to us about it.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2023 15:07:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655511#M17221</guid>
      <dc:creator>josh_beverly</dc:creator>
      <dc:date>2023-08-24T15:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655580#M17222</link>
      <description>&lt;P&gt;No one has contacted me. I put in a support ticket today. I requested either an expected date for a newer version of OpenSSL to be added, or instructions on how to do it manually without compromising functionality or future upgrades. When I get an answer from them, I will post it.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 05:29:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655580#M17222</guid>
      <dc:creator>tsondo</dc:creator>
      <dc:date>2023-08-25T05:29:27Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655584#M17223</link>
      <description>&lt;P&gt;I've raised a support ticket on this as well. I'll keep you updated on the outcome - if any&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":thinking_face:"&gt;🤔&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 06:24:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655584#M17223</guid>
      <dc:creator>ClausBom</dc:creator>
      <dc:date>2023-08-25T06:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655590#M17224</link>
      <description>&lt;P&gt;Tell your security team to obsess over something more relevant.&lt;/P&gt;&lt;P&gt;See the original OpenSSL advisory - &lt;A href="https://www.openssl.org/news/secadv/20230719.txt" target="_blank"&gt;https://www.openssl.org/news/secadv/20230719.txt&lt;/A&gt;&lt;/P&gt;&lt;PRE&gt;Due to the low severity of this issue we are not issuing new releases of
OpenSSL at this time. The fix will be included in the next releases when they
become available.&lt;/PRE&gt;&lt;P&gt;Your security team apparently didn't bother to verify what kind of vulnerability it was or if it was relevant in your situation in the first place. It's just the mechanical "we got a finding from our Nessus, we want to make you to get rid of it with no effort on our side, not even confirm that it's a real finding".&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 07:53:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655590#M17224</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-08-25T07:53:23Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655592#M17225</link>
      <description>&lt;P&gt;Well... if it wasn't for this line, in that advisory:&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;OpenSSL 3.1, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.&lt;/PRE&gt;&lt;P&gt;I guess I could tell them to focus on real problems... But Nessus complaints about $HOME/lib/libcrypto.so.1.0.0 in both Enterprise and Universal Forwarder - so they might have a right to obsess?&lt;BR /&gt;Splunk might not use this old stuff - but why isn't it removed then?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 08:02:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655592#M17225</guid>
      <dc:creator>ClausBom</dc:creator>
      <dc:date>2023-08-25T08:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655597#M17226</link>
      <description>&lt;P&gt;In my case it is a DoD system and the openssl hits reference three nist concerns:&lt;/P&gt;&lt;P&gt;&lt;A class="" title="https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2023-2975" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2975" target="_blank" rel="noreferrer noopener"&gt;CVE-2023-2975&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="" title="https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2023-3446" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3446" target="_blank" rel="noreferrer noopener"&gt;CVE-2023-3446&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="" title="https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2023-3817" href="https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-3817" target="_blank" rel="noreferrer noopener"&gt;CVE-2023-3817&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I linked the nist articles, but apparently that isn't allowed. You can search them out if you want to.&lt;/P&gt;&lt;P&gt;These are all considered medium vulnerabilities, except that under DoD the last one, authentication gets bumped up a notch because it is authentication related.&lt;/P&gt;&lt;P&gt;OpenSSL has already addressed them. The question is when will Splunk integrate them into their own install packages. Going back to DoD and saying that it really isn't a big deal and I'm not going to fix it won't fly.&lt;/P&gt;&lt;P&gt;The options are: get a vendor patch, get instructions from the vendor on how to patch it without an update, or update it without vendor support and hope you don't break anything.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 08:15:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655597#M17226</guid>
      <dc:creator>tsondo</dc:creator>
      <dc:date>2023-08-25T08:15:39Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655627#M17227</link>
      <description>&lt;P&gt;Just because the _file_ is named libssl.so.1.0.0 it doesn't mean that the actual library version is that ancient. It's a naming convention for the linker so if a library with version 1.0.0. is requested, the file is used.&lt;/P&gt;&lt;PRE&gt;(12:49:37) (splunk@mon1:~)&lt;BR /&gt;$ grep -Poa '1\.0\.2\S+' /opt/splunk/lib/libssl.so.1.0.0 &lt;BR /&gt;1.0.2zg-fips&lt;BR /&gt;1.0.2zg-fips&lt;BR /&gt;1.0.2zg-fips&lt;BR /&gt;1.0.2zg-fips&lt;BR /&gt;(12:50:09) (splunk@mon1:~)&lt;BR /&gt;$ /opt/splunk/bin/splunk cmd openssl version&lt;BR /&gt;OpenSSL 1.0.2zg-fips 7 Feb 2023&lt;BR /&gt;(12:50:15) (splunk@mon1:~)&lt;BR /&gt;$ cat /opt/splunk/etc/splunk.version &lt;BR /&gt;VERSION=9.1.0.2&lt;BR /&gt;BUILD=b6436b649711&lt;BR /&gt;PRODUCT=splunk&lt;BR /&gt;PLATFORM=Linux-x86_64&lt;/PRE&gt;&lt;P&gt;Which corresponds to &lt;A href="https://advisory.splunk.com/advisories/SVD-2023-0613" target="_blank" rel="noopener"&gt;https://advisory.splunk.com/advisories/SVD-2023-0613&lt;/A&gt;&lt;/P&gt;&lt;P&gt;(same goes for UFs - see &lt;A href="https://advisory.splunk.com/advisories/SVD-2023-0614" target="_blank" rel="noopener"&gt;https://advisory.splunk.com/advisories/SVD-2023-0614&lt;/A&gt; )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDIT: Nessus is notorious for flagging hosts as vulnerable only by checking the reported file/package version which is annoying in case of distros which backport fixes into earlier versions (debian stable?). And security teams are notorious for not checking the actual findings &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 10:55:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/655627#M17227</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-08-25T10:55:57Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/656056#M17240</link>
      <description>&lt;P&gt;So, answer from Splunk Support:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;You should not remove file libcrypto.so.1.0.0, it is part of libraries. This file exists in fresh new 9.1.0.2 Splunk installation too, so it is not part of old upgrade.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Splunk version 9.1.0.2 uses OpenSSL 1.0.2zg.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Topic about CVE-2023-3446 vulnerability was send to developer team.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the meantime, Tennable apparently found out, that they'd been a bit premature... OpenSSL disappeared from their scannings...&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":face_with_rolling_eyes:"&gt;🙄&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":face_with_steam_from_nose:"&gt;😤&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2023 07:12:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/656056#M17240</guid>
      <dc:creator>ClausBom</dc:creator>
      <dc:date>2023-08-30T07:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/679774#M17661</link>
      <description>&lt;P&gt;yes, still we observed vulnerability&amp;nbsp; openssl libraries files having 1.0.2zi FIPS with latest SplunkForwarder 9.2.0.1 as below.&lt;/P&gt;&lt;P&gt;# cat /opt/splunkforwarder/etc/splunk.version&lt;BR /&gt;VERSION=9.2.0.1&lt;BR /&gt;BUILD=d8ae995bf219&lt;BR /&gt;PRODUCT=splunk&lt;BR /&gt;PLATFORM=Linux-x86_64&lt;/P&gt;&lt;P&gt;Library files&lt;/P&gt;&lt;P&gt;r-xr-xr-x. 1 splunk splunk 475784 Feb 7 00:48 libssl.so.1.0.0&lt;/P&gt;&lt;P&gt;r-xr-xr-x. 1 splunk splunk 2996816 Feb 7 00:48 libcrypto.so.1.0.0&lt;/P&gt;&lt;P&gt;How to mitigate this vulnerability ?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2024 11:21:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/679774#M17661</guid>
      <dc:creator>mp1</dc:creator>
      <dc:date>2024-03-06T11:21:26Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/679781#M17662</link>
      <description>&lt;P&gt;Have you read anything that has been written in this thread? Have you checked what openssl version is used here? (I'm talking about the actual library version, not the filename).&lt;/P&gt;&lt;P&gt;How have you "observed vulnerability"? Again - Nessus "detected" it by checking filename?&lt;/P&gt;&lt;P&gt;I'm all for vulnerability scanning but it should be performed properly, not just "run scanner with default settings and assume every finding is a true positive".&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2024 12:09:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/679781#M17662</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-03-06T12:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/680418#M17679</link>
      <description>&lt;P&gt;I have the UFW 9.2.0.1 and still got the OpenSSL 1.0.2zi-fips, it's def not the same version you are pointing here. And to be sure I checked runing the splunk cmd openssl version.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2024 16:53:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/680418#M17679</guid>
      <dc:creator>TarnishedMalwar</dc:creator>
      <dc:date>2024-03-12T16:53:21Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/688868#M17894</link>
      <description>&lt;P&gt;Yeah, the scanner is now primarily complaining about OpenSSL 1.0.2 being EOL (OpenSSL SEoL (1.0.2.x)), which also then means there are associated CVEs.&lt;/P&gt;&lt;P&gt;$ /opt/splunk/bin/splunk cmd openssl version&lt;BR /&gt;OpenSSL 1.0.2zi-fips 1 Aug 2023&lt;/P&gt;&lt;P&gt;So this is clearly an outdated version of OpenSSL being shipped with Splunk Enterprise 9.2.0.1&lt;/P&gt;&lt;P&gt;So the question is still valid, why ship splunk with an EOL version of OpenSSL?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 11:15:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/688868#M17894</guid>
      <dc:creator>fatsug</dc:creator>
      <dc:date>2024-05-28T11:15:56Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/688879#M17895</link>
      <description>&lt;P&gt;I found an answer for this. If you check out openssl.org, the version is not actually EOL for PREMIUM customers, which Splunk is. An annotation in the findings checklist should suffice.&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 12:25:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/688879#M17895</guid>
      <dc:creator>tsondo</dc:creator>
      <dc:date>2024-05-28T12:25:57Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/688956#M17898</link>
      <description>&lt;P&gt;Sure, that allows me to snooze the alert. How can I validate this information, is this documented somewhere?&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 07:34:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/688956#M17898</guid>
      <dc:creator>fatsug</dc:creator>
      <dc:date>2024-05-29T07:34:46Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/688957#M17899</link>
      <description>&lt;P&gt;As I said, go to openssl.org. The information is there.&lt;/P&gt;&lt;TABLE width="179"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="179"&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Wed, 29 May 2024 08:21:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/688957#M17899</guid>
      <dc:creator>tsondo</dc:creator>
      <dc:date>2024-05-29T08:21:20Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/688961#M17900</link>
      <description>&lt;P&gt;Yes and no. I guess my question could have been a bit more concrete and clear.&lt;/P&gt;&lt;P&gt;It does list the details regarding premium services (&lt;A href="https://www.openssl.org/support/contracts.html#premium" target="_blank"&gt;[ Contracts ] - /support/contracts.html (openssl.org)&lt;/A&gt;) inkluding LTS for 1.0.2.&lt;/P&gt;&lt;P&gt;But it does not list any premium customers. I'm struggling to validate that the LTS versions is what is shipped with Splunk. I have not found&amp;nbsp; information documenting this as a fact by Splunk representatives yet.&lt;/P&gt;&lt;P&gt;If you can point me to the documentation regaring Splunk being a premium customer I'd appreciate it very much. Then I have something to lean on while ignoring the alerts &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 08:31:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/688961#M17900</guid>
      <dc:creator>fatsug</dc:creator>
      <dc:date>2024-05-29T08:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: Why is OPENSSL vulnerability still showing in latest release?</title>
      <link>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/688968#M17901</link>
      <description>&lt;P&gt;Ok, that's what was missing! So I deduced it from the following information:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;From OpenSSL.Org:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;****&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;OpenSSL 1.0.2 is out of support since 1st January 2020 and is no longer receiving updates. Extended support is available from OpenSSL Software Services for premium support customers.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CVE-2024-0727 - Fixed in OpenSSL 1.0.2zj &lt;A class="" title="https://www.openssl.org/support/contracts.html?giturl=https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539" href="https://www.openssl.org/support/contracts.html?giturl=https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539" target="_blank" rel="noreferrer noopener"&gt;(premium support) (Affected since 1.0.2)&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;****&lt;/P&gt;&lt;P&gt;Since only premium customers get 1.0.2.zj, and Splunk has it, they are therefore a Premium customer.&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 09:02:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Why-is-OPENSSL-vulnerability-still-showing-in-latest-release/m-p/688968#M17901</guid>
      <dc:creator>tsondo</dc:creator>
      <dc:date>2024-05-29T09:02:09Z</dc:date>
    </item>
  </channel>
</rss>

