logoalt Hacker News

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing

62 pointsby MagerValptoday at 4:56 PM35 commentsview on HN

Comments

ofektoday at 8:14 PM

I'd encourage folks to read the recently-published statement [1] about the state of OpenSSL from Python's cryptography project.

[1]: https://news.ycombinator.com/item?id=46624352

chc4today at 6:06 PM

2026 and we still have bugs from copying unbounded user input into fixed size stack buffers in security critical code. Oh well, maybe we'll fix it in the next 30 years instead.

show 3 replies
notherhacktoday at 6:57 PM

Looks like Debian and some other distros are still on the vulnerable 3.5.4. Why did Openssl publish before the distros rolled to the fixed version?

1over137today at 8:54 PM

Has anyone built OpenSSL with -fbounds-safety?

selckintoday at 5:41 PM

Can someone translate

"Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable"

to human?

show 3 replies
alanfranztoday at 6:10 PM

Is this really exploitable? Is stack smashing really still a thing on any modern platform?

show 5 replies
TacticalCodertoday at 6:58 PM

Very strange, as I type this both Bullseye and Bookworm are marked as fixed but Trixie isn't yet:

https://security-tracker.debian.org/tracker/CVE-2025-11187

show 2 replies
jeffbeetoday at 6:33 PM

Another "fix" in the long line of OpenSSL "fixes" that includes no changes to tests and therefore can't really be said to fix anything. Professional standards of software development are simply absent in the project, and apparently it cannot be reformed, because we've all been waiting a long time for OpenSSL to get its act together.

show 2 replies
m00dytoday at 8:18 PM

Please use Rust.