@@ -28,6 +28,72 @@ OpenSSL Releases
28
28
OpenSSL 3.5
29
29
-----------
30
30
31
+ ### Changes between 3.5.3 and 3.5.4 [30 Sep 2025]
32
+
33
+ * Fix Out-of-bounds read & write in RFC 3211 KEK Unwrap
34
+
35
+ Issue summary: An application trying to decrypt CMS messages encrypted using
36
+ password based encryption can trigger an out-of-bounds read and write.
37
+
38
+ Impact summary: This out-of-bounds read may trigger a crash which leads to
39
+ Denial of Service for an application. The out-of-bounds write can cause
40
+ a memory corruption which can have various consequences including
41
+ a Denial of Service or Execution of attacker-supplied code.
42
+
43
+ The issue was reported by Stanislav Fort (Aisle Research).
44
+
45
+ ([CVE-2025-9230])
46
+
47
+ *Viktor Dukhovni*
48
+
49
+ * Fix Timing side-channel in SM2 algorithm on 64 bit ARM
50
+
51
+ Issue summary: A timing side-channel which could potentially allow remote
52
+ recovery of the private key exists in the SM2 algorithm implementation on
53
+ 64 bit ARM platforms.
54
+
55
+ Impact summary: A timing side-channel in SM2 signature computations on
56
+ 64 bit ARM platforms could allow recovering the private key by an attacker.
57
+
58
+ The issue was reported by Stanislav Fort (Aisle Research).
59
+
60
+ ([CVE-2025-9231])
61
+
62
+ *Stanislav Fort and Tomáš Mráz*
63
+
64
+ * Fix Out-of-bounds read in HTTP client no_proxy handling
65
+
66
+ Issue summary: An application using the OpenSSL HTTP client API functions
67
+ may trigger an out-of-bounds read if the "no_proxy" environment variable is
68
+ set and the host portion of the authority component of the HTTP URL is an
69
+ IPv6 address.
70
+
71
+ Impact summary: An out-of-bounds read can trigger a crash which leads to
72
+ Denial of Service for an application.
73
+
74
+ The issue was reported by Stanislav Fort (Aisle Research).
75
+
76
+ ([CVE-2025-9232])
77
+
78
+ *Stanislav Fort*
79
+
80
+ * The FIPS provider no longer performs a PCT on key import for ECX keys
81
+ (that was introduced in 3.5.2), following the latest update
82
+ on that requirement in FIPS 140-3 IG 10.3.A additional comment 1.
83
+
84
+ *Eugene Syromiatnikov*
85
+
86
+ * Fixed the length of the ASN.1 sequence for the SM3 digests of RSA-encrypted
87
+ signatures.
88
+
89
+ *Xiao Lou Dong Feng*
90
+
91
+ * Reverted the synthesised `OPENSSL_VERSION_NUMBER` change for the release
92
+ builds, as it broke some exiting applications that relied on the previous
93
+ 3.x semantics, as documented in `OpenSSL_version(3)`.
94
+
95
+ *Richard Levitte*
96
+
31
97
### Changes between 3.5.2 and 3.5.3 [16 Sep 2025]
32
98
33
99
* Avoided a potential race condition introduced in 3.5.1, where
@@ -21284,6 +21350,9 @@ ndif
21284
21350
21285
21351
<!-- Links -->
21286
21352
21353
+ [CVE-2025-9232]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-9232
21354
+ [CVE-2025-9231]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-9231
21355
+ [CVE-2025-9230]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-9230
21287
21356
[CVE-2025-4575]: https://www.openssl.org/news/vulnerabilities.html#CVE-2025-4575
21288
21357
[CVE-2024-13176]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-13176
21289
21358
[CVE-2024-9143]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-9143
0 commit comments