Splunk Enterprise

When will Splunk address the OpenSSL vulnerability issue (CVE-2016-2107; OpenSSL <1.0.2h)?

dwhill
New Member

Splunk 6.4.1 is linked against OpenSSL 1.0.2g which has a security flaw (CVE-2016-2107). When will Splunk with fixed OpenSSL (1.0.2h) be available?

0 Karma

tchimento_splun
Splunk Employee
Splunk Employee

Our next maintenance release will include the 1.0.2h version.

dewald13
Path Finder

6.4.2 is now released and looks to still have 1.0.2g.............still not fixed

0 Karma

tchimento_splun
Splunk Employee
Splunk Employee

Exactly what did you download and from where? We just confirmed that 6.4.2 is using OpenSSL 1.0.2h for both Linux and for Windows.

0 Karma

dewald13
Path Finder

I was looking here http://docs.splunk.com/Documentation/Splunk/6.4.2/ReleaseNotes/OpenSSL which states 6.4.2 still has v1.0.2g. But I did install last night and you are correct, it is running 1.0.2h

thanks for the quick response

0 Karma

jfeitosa
Path Finder

I have the same problem, and other vulnerabilities found in communication between the Universal Forwarder and Splunk Manager.

Does anyone know how to mitigate these vulnerabilities? Force use TLS? How do correctly?

Tks

0 Karma

tchimento_splun
Splunk Employee
Splunk Employee

We are targeting the release for the second or third week of July. All such release dates may change if unanticipated issues arise.

0 Karma

dwhill
New Member

When is the next maintenance release scheduled for?

0 Karma
Get Updates on the Splunk Community!

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...