#openssl

2026-02-02

@heisec

Wonder how big the "actual existing security vulnerability to fabricated noise" ratio is for the #OpenSSL project.

Based upon what the #curl project reported so far I'd assume that this is just a lucky coincidence.

Aka even a blind hen sometimes finds a grain of corn...

#itsecurity #infosec #itsec

2026-02-02

OpenSSL: 12 security gaps, one allows malicious code execution and is critical

12 security vulnerabilities have been discovered in OpenSSL – using AI tools. One of them is considered critical. Updated software is available.

heise.de/en/news/OpenSSL-12-se

#IT #KünstlicheIntelligenz #OpenSSL #Security #Sicherheitslücken #Updates #news

2026-02-02

OpenSSL: 12 Sicherheitslecks, eines erlaubt Schadcodeausführung und ist kritisch

In OpenSSL wurden 12 Sicherheitslücken entdeckt – mit KI-Tools. Eine davon gilt als kritisch. Aktualisierte Software steht bereit.

heise.de/news/OpenSSL-12-Siche

#IT #KünstlicheIntelligenz #OpenSSL #Security #Sicherheitslücken #Updates #news

2026-02-02

#Linux Weekly Roundup for February 1st, 2026: #Xfce gets #Rust-based #Wayland compositor, #GParted 1.8, #Transmission 4.1, #GStreamer 1.28, #OpenSSL 3.6.1, #Proton 10.0-4, GParted Live 1.8, #VirtualBox 7.2.6, #Calibre 9.0, #Tails 7.4.1, #AerynOS 2026.01, Linux Lite 7.8, #Shotcut 26.1, TigerVNC 1.16, Emmabuntüs Debian Edition 5 1.05, and more 9to5linux.com/9to5linux-weekly

#OpenSource #FOSS

9to5Linux Weekly Roundup - February 1st, 2026

For those who didn't wait and installed v3.5.5 on their own or from Sid, FYI it landed in #Debian Testing today. I don't track Stable but generally speaking, when there's a major fashion faux pas updates can actually land in Stable (coming straight from Sid) before they do in Testing.

For those who run #Slackware -current, you wouldn't have really noticed anything, since #OpenSSL version 3.5.5 was pushed out on 27 January. And again, Slackware is one of, if not the first to address and act on exploits and vulnerabilities, often on #0day.

Fun Fact: Following the very public cannibalization of Sun Microsystems by the Evil EllisonCo (Oracle), Slackware Linux was the first major distro to adopt and release #MariaDB, replacing #MySQL as the default in the installation - credit where due, IIRC, the German fork of Slackware, #SuSE, was the second major distro to do so shortly thereafter.

Partial of the Slackware Changelog for 27 January 2026 with the release of OpenSSL v3.5.5 highlighted.

It's actually not a bad idea to follow this changelog no matter which distros you administer because the Slackware team is more often than not the very first to respond and release the patched packages.
Stéphane Bortzmeyerbortzmeyer@mastodon.gougere.fr
2026-02-01

For #DNSSEC, the domain crate can use different crypto backends such as the ring crate or the #OpenSSL bindings. (But there are more.)

There is now a common-line tool to query the DNS, dnsi. And a CLI tool to do misc. manipulations, dnst ("people are using the ldns library example programs in production"). And a key manager, keyset.

#FOSDEM

2026-01-31

Lol. Looking at openssl v3.5.4 PKCS#7 command and it only understands rfc 2315 but not rfc 2630.

It doesn't even mention rfc 5652 (sep 2009) which obsoletes rfc 3852 (July 2004) which obsoletes rfc 3369 (August 2002) which obsoletes rfc 2630 (June 1999).

So openssl is literally stuck in the last millennia when dealing with encrypted files/data.

It's possible that it's smime subcommand may do it as there's a pkcs7 option, but it doesn't mention which, if any rfc that the smime command follows.

#OpenSSL

2026-01-30

If you’re totally bored this Friday then there’s something to wake up all #infosec folks - a series of new vulnerabilities in #OpenSSL has just landed, including one high-severity. While it’s described as ‘remote-code execution’ kind of fortunately it applies to a stored digital signature format (CMS) which is used in digitally signed PDF and S/MIME but not in any transport security protocols.

https://openssl-library.org/news/vulnerabilities/index.html

2026-01-30

Encryption protocol: AmiSSL 5.26
The open source encryption protocol AmiSSL has been updated to include the changes made in OpenSSL version 3.6.1, which was released two days ago. The latter fixes various bugs, including a high-priority CVE vulnerability.

amiga-news.de/en/news/AN-2026-

#OpenSSL #AmiSSL #Amiga

Sam Stepanyan :verified: 🐘securestep9@infosec.exchange
2026-01-29

#OpenSSL Critical Vulnerabilities Allow Remote Attackers to Execute Malicious Code (CVE-2025-15467). Patches released:
👇
cybersecuritynews.com/openssl-

モスケ^^ ❄️🐈🔥🐴tramtrist@famichiki.jp
2026-01-29

Why do we use this library? Is there really nothing else???

#openssl #fos

Javier Jimenez Shawjjimenezshaw@mapstodon.space
2026-01-29

Potentially Critical RCE Vulnerability in OpenSSL

research.jfrog.com/post/potent

(there is a fix already released)

#cve202515467 #CVE #openssl

Michel Lind :fedora: :debian:michelin@hachyderm.io
2026-01-29

#PSA for #CentOS #CentOS_Stream users - if you need fixed #OpenSSL builds immediately you can use the #CentOS_ProposedUpdates builds (not available for i686 due to Community Build Service limitations)

`sudo dnf install centos-release-proposed_updates && sudo dnf update 'openssl*'`

openssl-library.org/news/vulne

These are based on the MRs in progress for the official @centos Stream package and will be cleanly upgradable to the final build

#security

openssl-library.org/news/vulne

2026-01-29

The State of OpenSSL for pyca/cryptography — Cryptography 47.0.0.dev1 documentation
cryptography.io/en/latest/stat

#OpenSSL

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst