Yeah, most distros are on openssl 1.0.0 now, but their package building and updating model is different than ours and allows more frequent updates. Debian stable is still on 0.9.8, though.
THere are 996 tcz extensions that have openssl as a dependent in their dep tree. And there are no known vulnerabilities that have not been fixed by the "r" version of 0.9.8 that we are now using. Also, I think I remember reading that most of openssl exploits that are discovered only affect openssl when used as a server, and not when used as a shared lib. We use it here as a shared lib almost exclusively.
If someone wants to use a newer version of openssl to use it as a server, it is a simple "configure && make && make install" to keep up with the latest version. And if one wants to use the newest openssl to build against, they can either package the newer libs in a self contained extension or link to a newer openssl statically.
I want to hear what the other main extension makers think, but at this point I think we probably are all on the same page.