frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Try Clawdbot Online

https://www.tryclawd.io/
1•ssslvky1•2m ago•1 comments

Ask HN: What's something interesting you learned from training your own GPT?

1•amadeuswoo•4m ago•0 comments

CSS selectors are global and evaluated RTL

https://bsky.app/profile/brandondail.com/post/3mdg76zewxk2e
1•linolevan•5m ago•0 comments

A CEO, Captured

https://om.co/2026/01/27/a-ceo-captured/
3•speckx•6m ago•0 comments

Known Physical Bitcoin Attacks

https://github.com/jlopp/physical-bitcoin-attacks
2•alcazar•6m ago•0 comments

History of the browser user-agent string (2008)

https://webaim.org/blog/user-agent-string-history/
2•smushy•7m ago•0 comments

Show HN: Maditate – Meditation timer tracking your 10k hours to enlightenment

https://maditation.app
1•koryna•8m ago•0 comments

Why code indexing matters for AI security tools

https://www.gecko.security/blog/why-static-analysis-struggles-with-business-logic
1•jjjutla•9m ago•1 comments

Supreme Court to consider whether geofence warrants are constitutional

https://therecord.media/supreme-court-geofence-constitutionality
2•zdw•9m ago•0 comments

Ice Drives Unmarked Cars. This Public Database Tracks Their License Plates

https://theintercept.com/2026/01/02/ice-license-plates-database/
12•JumpCrisscross•11m ago•1 comments

Arm's Cortex A725 Ft. Dell's Pro Max with GB10

https://chipsandcheese.com/p/arms-cortex-a725-ft-dells-pro-max
1•pixelpoet•11m ago•0 comments

Larry says the race for AI will be led by those with private company data

https://www.ibtimes.co.uk/larry-ellison-says-ai-race-will-led-those-access-private-enterprise-dat...
1•01-_-•11m ago•1 comments

Blocking Claude

https://aphyr.com/posts/403-blocking-claude
1•zdw•12m ago•0 comments

Trump's use of AI images pushes new boundaries, further eroding public trust

https://apnews.com/article/ai-videos-trump-ice-artificial-intelligence-08d91fa44f3146ec1f8ee4d213...
7•geox•12m ago•0 comments

Is Boston's tech and innovation scene withering?

https://www.bostonglobe.com/2026/01/27/business/boston-tech-innovation-biotech-worry/
1•martincmartin•12m ago•0 comments

Lennart Poettering, Christian Brauner founded a new company

https://amutable.com/about
23•hornedhob•13m ago•8 comments

Worklist: A zero‑knowledge task manager for teams

https://worklist.app/
1•a0b2a33•14m ago•1 comments

The Spectrum of Agentic Coding

https://agenticcoding.substack.com/p/the-spectrum-of-agentic-coding
1•ykdojo•15m ago•0 comments

Washington Post may cut sports section amid layoffs

https://www.sportsbusinessjournal.com/Articles/2026/01/26/report-washington-post-may-cut-sports-s...
1•ortusdux•16m ago•0 comments

AI-induced cultural stagnation is no longer speculation − it's happening

https://theconversation.com/ai-induced-cultural-stagnation-is-no-longer-speculation-its-already-h...
1•cdrnsf•16m ago•0 comments

New Android Theft Protection Feature Updates: Smarter, Stronger

https://security.googleblog.com/2026/01/android-theft-protection-feature-updates.html
1•ImJamal•17m ago•0 comments

Show HN: splitby — a modern, regex capable alternative to cut

https://serenacula.github.io/splitby/
1•Serenacula•20m ago•0 comments

Systemd Founder Lennart Poettering Announces Amutable Company

https://www.phoronix.com/news/Amutable
3•ImJamal•20m ago•0 comments

What it's like to get undressed by Grok

https://www.rollingstone.com/culture/culture-features/grok-sexualized-image-xai-elon-musk-women-1...
7•ryandrake•21m ago•0 comments

Steve at Home

https://stevejobsarchive.com/artifact/steve-at-home-sitting-under-his-tiffany-lamp
3•mefengl•21m ago•0 comments

LG's new subscription program charges up to £277 per month to rent a TV

https://arstechnica.com/gadgets/2026/01/lgs-new-subscription-program-charges-up-to-277-per-month-...
1•voxadam•21m ago•0 comments

The Interventions We Need

https://fivetwelvethirteen.substack.com/p/the-interventions-we-need
1•yorwba•22m ago•0 comments

Show HN: EduFSDP – Minimal and educational Fully Sharded Data Parallel

https://github.com/0xNaN/edufsdp
1•xnan•23m ago•1 comments

Google Suite CLI: Gmail, GCal, GDrive, GContacts

https://github.com/steipete/gogcli
1•nateb2022•24m ago•0 comments

The Most Dangerous Code in the World: Non-Browser Software Validating SSL Certs [pdf]

https://www.cs.cornell.edu/~shmat/shmat_ccs12.pdf
1•ripe•25m ago•0 comments
Open in hackernews

OpenSSL: Stack buffer overflow in CMS AuthEnvelopedData parsing

https://openssl-library.org/news/vulnerabilities/#CVE-2025-15467
40•MagerValp•2h ago

Comments

selckin•1h ago
Can someone translate

"Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable"

to human?

woodruffw•1h ago
Services that process CMS[1] or PKCS#7 envelopes may be vulnerable to this bug. The most common example of these is S/MIME (for signed/encrypted email), but PKCS#7 and CMS show up in all kinds of random places.

(Unless I'm missing something, a key piece of context here is that CMD/PKCS#7 blobs are typically allowed to select their own algorithms, at least within an allowlist controlled by the receiving party. So the fact that it depends on an AEAD-specific parameter encoding is probably not a huge hurdle for someone looking to exploit this.)

[1]: https://datatracker.ietf.org/doc/html/rfc5652

[2]: https://datatracker.ietf.org/doc/html/rfc2315

tptacek•1h ago
PKCS7 is a container format that pops up in a couple places in the TLS ecosystem (also in code signing); anywhere you need a secure blob that includes metadata. It's a very widely used format.

AEAD ciphers are those that simultaneously encrypt and authenticate data. AES-GCM is the most popular; Chapoly is the 2nd most popular. AEAD ciphers are how modern programs do encryption.

AEAD ciphers all rely on additional parameters, most commonly a nonce; it's critical to security that the nonce only ever be used once with a given key. You need the nonce to decrypt the AEAD ciphertext, so it's usually tacked on to the message (in more clever formats you can derive it contextually, but PKCS7 is a general-purpose format).

In parsing PKCS7 messages, when OpenSSL comes across AEAD-encrypted blobs, it needs to parse out the nonce. AEAD nonces tend to have fixed sizes, but there are extended-nonce variants of AEADs, and the format allows for arbitrary-sized values. OpenSSL assumed a fixed nonce size, but parsed with a library that handled arbitrary-sized values. Stack overflow.

A maliciously formatted Authenticode signature, certificate chain, OCSP response (I think?), all things that could trigger the bug.

chc4•1h ago
2026 and we still have bugs from copying unbounded user input into fixed size stack buffers in security critical code. Oh well, maybe we'll fix it in the next 30 years instead.
rvz•52m ago
2026 and why not vibe code our own cryptography library just like we are vibing lots of sandbox solutions? /s
pixl97•31m ago
It's 2023, why not use Rustls.

It's 2014, why not use LibreSSL.

You don't have to bring up AI, everyone just needs to leave OpenSSL to die.

TacticalCoder•15m ago
> 2026 and why not vibe code our own cryptography library just like we are vibing lots of sandbox solutions? /s

And make sure to make it a hybrid of PHP and JavaScript /s

nly•32m ago
The bug isn't actually the copy but the bounds check.

If you had a dynamically sized heap allocated buffer as the destination you'd still have a denial of service attack, no matter what language was used.

JohnLeitch•11m ago
Assuming you're talking about a heap buffer overrun, it's still possible to exploit for EoP in some cases.
nly•1m ago
No, I mean you'd just allocate a tonne of memory
alanfranz•1h ago
Is this really exploitable? Is stack smashing really still a thing on any modern platform?
alanfranz•57m ago
I’ll answer to myself: an RCE is very unlikely on any modern platform. DoS is possible.

“ Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution.”

From: https://openssl-library.org/news/secadv/20260127.txt

woodruffw•44m ago
"Modern platform" is doing a lot of lifting; CMS and PKCS#7 rear their heads in all kinds of random places, like encryption/signing of OTA updates for routers. Those platforms are often (unreasonably) 10-20 years behind the norm for compile-time mitigations.
b1temy•42m ago
The link in the HN submission contains the same text and excerpt from your link.

Additionally they note: -

"While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk."

IMO, probably in of itself, this alone is not able to do much besides maybe a crash / Denial of Service on modern systems. But it might be able to be used as part of a more advanced exploit chain, alongside other vulnerabilities, to potentially reach remote code execution, though this would be a much more sophisticated exploit and is maybe a bit of a reach. Still, I hesitate to call it impossible on modern systems due to the creativity of exploit developers.

alanfranz•38m ago
You are right. I linked a differently formatted article with the same content. I don’t know why I didn’t initially notice such text.
buckle8017•47m ago
That depends on how aggressively the service is restarted.
chc4•43m ago
OpenSSL is used by approximately everything under the sun. Some of those users will be vendors that use default compiler flags without stack cookies. A lot of IoT devices for example still don't have stack cookies for any of their software.
JohnLeitch•8m ago
It depends on what mitigations are in place and the arrangement of the stack. Even with stack canaries, having an unfortunate value on the stack e.g. a function pointer can still be quite dangerous if it can be overwritten without hitting any of the stack canaries.
jeffbee•37m ago
Another "fix" in the long line of OpenSSL "fixes" that includes no changes to tests and therefore can't really be said to fix anything. Professional standards of software development are simply absent in the project, and apparently it cannot be reformed, because we've all been waiting a long time for OpenSSL to get its act together.
notherhack•13m ago
Looks like Debian and some other distros are still on the vulnerable 3.5.4. Why did Openssl publish before the distros rolled to the fixed version?
TacticalCoder•12m ago
Very strange, as I type this both Bullseye and Bookworm are marked as fixed but Trixie isn't yet:

https://security-tracker.debian.org/tracker/CVE-2025-11187

Sesse__•11m ago
bullseye and bookworm have too old versions to be vulnerable, it seems.
TacticalCoder•54s ago
Oh that's interesting: it indeeds shows "not affected" in the second table on the link I pasted but before that on the first table it says "Status // Fixed / Fixed".

I never paid attention to the fact that one table had "Fixed" and the other "Not affected" for the same "Not affected" package.