<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Openssl on Flatcar Container Linux</title>
    <link>/tags/openssl/</link>
    <description>Recent content in Openssl on Flatcar Container Linux</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <copyright>Copyright © The Flatcar Project Contributors.

Copyright © Flatcar a Series of LF Projects, LLC.

For website terms of use, trademark policy and other project policies please see &lt;a href=&#34;https://lfprojects.org/policies/&#34;&gt;lfprojects.org/policies&lt;/a&gt;.
</copyright>
    <lastBuildDate>Mon, 07 Nov 2022 14:00:00 +0200</lastBuildDate>
    <atom:link href="/tags/openssl/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>About the handling of embargoed security issues</title>
      <link>/blog/2022/11/about-the-handling-of-embargoed-security-issues/</link>
      <pubDate>Mon, 07 Nov 2022 14:00:00 +0200</pubDate>
      <guid>/blog/2022/11/about-the-handling-of-embargoed-security-issues/</guid>
      <description>&lt;p&gt;&lt;strong&gt;TL; DR&lt;/strong&gt;: Flatcar is safe against recent OpenSSL vulnerabilities&lt;/p&gt;&#xA;&lt;p&gt;With the recent OpenSSL vulnerabilities &#xA;&#xA;&#xA;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2022-3786&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;CVE-2022-3786&lt;/a&gt;&#xA; and &#xA;&#xA;&#xA;&lt;a href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2022-3602&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;CVE-2022-3602&lt;/a&gt;&#xA;,&#xA;the Flatcar team has provided as soon as possible a batch of releases for impacted Flatcar channels (all except LTS which is not impacted).&#xA;Releases have been published within one hour after the official public &#xA;&#xA;&#xA;&lt;a href=&#34;https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;announcement&lt;/a&gt;&#xA; and&#xA;users were able to secure their workloads almost immediately without unexpected turbulences as the releases included only minimal changes to address the security issues.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
