Thanks @1PW ! (when I was online not all the info was yet available) OpenSSL Security Advisory [7th February 2023] https://www.openssl.org/news/secadv/20230207.txt Read there more! Also here: https://mta.openssl.org/pipermail/openssl-announce/2023-February/thread.html
Final version of OpenSSL 3.1.0 - 14 Mar 2023 https://www.openssl.org/news/newslog.html OpenSSL 3.1 Series Release Notes https://www.openssl.org/news/openssl-3.1-notes.html See also: OpenSSL version 3.1.0 published https://mta.openssl.org/pipermail/openssl-announce/2023-March/000252.html
OpenSSL 1.1.1 End of Life - 11th September 2023 by Matt Caswell , Mar 28th, 2023 https://www.openssl.org/blog/blog/2023/03/28/1.1.1-EOL/
OpenSSL Security Advisory [20th April 2023] Input buffer over-read in AES-XTS implementation on 64 bit ARM (CVE-2023-1255) https://www.openssl.org/news/secadv/20230420.txt Read there more. See also https://mta.openssl.org/pipermail/openssl-announce/2023-April/thread.html
Forthcoming OpenSSL Releases - 30th May 2023 Two messages, for the timeline see also : https://mta.openssl.org/pipermail/openssl-announce/2023-May/thread.html 1. Tomas Mraz Wed May 24 04:06:12 UTC 2023 https://mta.openssl.org/pipermail/openssl-announce/2023-May/000258.html 2. Matt Caswell Wed May 24 09:49:13 UTC 2023 https://mta.openssl.org/pipermail/openssl-announce/2023-May/000259.html
OpenSSL Security Advisory [30th May 2023] https://www.openssl.org/news/secadv/20230530.txt = More quotes = OpenSSL 3.0.x and 3.1.x are vulnerable to this issue. OpenSSL 1.1.1 and 1.0.2 users may be affected by this issue when calling OBJ_obj2txt() directly. OpenSSL 3.0 users should upgrade to OpenSSL 3.0.9. OpenSSL 3.1 users should upgrade to OpenSSL 3.1.1. OpenSSL 1.1.1 users should upgrade to OpenSSL 1.1.1u. OpenSSL 1.0.2 users should upgrade to OpenSSL 1.0.2zh (premium support customers only). = end of more quotes = Read there more!