@@ -12,6 +12,7 @@ appropriate release branch.
12
12
OpenSSL Releases
13
13
----------------
14
14
15
+ - [OpenSSL 3.5](#openssl-35)
15
16
- [OpenSSL 3.4](#openssl-34)
16
17
- [OpenSSL 3.3](#openssl-33)
17
18
- [OpenSSL 3.2](#openssl-32)
@@ -27,11 +28,99 @@ OpenSSL Releases
27
28
OpenSSL 3.4
28
29
-----------
29
30
31
+ ### Changes between 3.4 and 3.5 [xx XXX xxxx]
32
+
33
+ * none yet
34
+
35
+ OpenSSL 3.4
36
+ -----------
37
+
30
38
### Changes between 3.3 and 3.4 [xx XXX xxxx]
31
39
40
+ * Improved base64 BIO correctness and error reporting.
41
+
42
+ *Viktor Dukhovni*
43
+
44
+ * Added support for directly fetched composite signature algorithms such as
45
+ RSA-SHA2-256 including new API functions in the EVP_PKEY_sign,
46
+ EVP_PKEY_verify and EVP_PKEY_verify_recover groups.
47
+
48
+ *Richard Levitte*
49
+
50
+ * XOF Digest API improvements
51
+
52
+ EVP_MD_CTX_get_size() and EVP_MD_CTX_size are macros that were aliased to
53
+ EVP_MD_get_size which returns a constant value. XOF Digests such as SHAKE
54
+ have an output size that is not fixed, so calling EVP_MD_get_size() is not
55
+ sufficent. The existing macros now point to the new function
56
+ EVP_MD_CTX_get_size_ex() which will retrieve the "size" for a XOF digest,
57
+ otherwise it falls back to calling EVP_MD_get_size(). Note that the SHAKE
58
+ implementation did not have a context getter previously, so the "size" will
59
+ only be able to be retrieved with new providers.
60
+
61
+ Also added a EVP_xof() helper.
62
+
63
+ *Shane Lontis*
64
+
65
+ * Added FIPS indicators to the FIPS provider.
66
+
67
+ FIPS 140-3 requires indicators to be used if the FIPS provider allows
68
+ non-approved algorithms. An algorithm is approved if it passes all
69
+ required checks such as minimum key size. By default an error will
70
+ occur if any check fails. For backwards compatibility individual
71
+ algorithms may override the checks by using either an option in the
72
+ FIPS configuration OR in code using an algorithm context setter.
73
+ Overriding the check means that the algorithm is not FIPS compliant.
74
+ OSSL_INDICATOR_set_callback() can be called to register a callback
75
+ to log unapproved algorithms. At the end of any algorithm operation
76
+ the approved status can be queried using an algorithm context getter.
77
+ FIPS provider configuration options are set using 'openssl fipsinstall'.
78
+
79
+ Note that new FIPS 140-3 restrictions have been enforced such as
80
+ RSA Encryption using PKCS1 padding is no longer approved.
81
+ Documentation related to the changes can be found on the [fips_module(7)]
82
+ manual page.
83
+
84
+ [fips_module(7)]: https://docs.openssl.org/master/man7/fips_module/#FIPS indicators
85
+
86
+ *Shane Lontis, Paul Dale, Po-Hsing Wu and Dimitri John Ledkov*
87
+
88
+ * Added support for hardware acceleration for HMAC on S390x architecture.
89
+
90
+ *Ingo Franzki*
91
+
92
+ * Added debuginfo Makefile target for unix platforms to produce
93
+ a separate DWARF info file from the corresponding shared libs.
94
+
95
+ *Neil Horman*
96
+
97
+ * Added support for encapsulation and decapsulation operations in the
98
+ pkeyutl command.
99
+
100
+ *Dmitry Belyavskiy*
101
+
102
+ * Added implementation of RFC 9579 (PBMAC1) in PKCS#12.
103
+
104
+ *Dmitry Belyavskiy*
105
+
106
+ * Add a new random seed source RNG `JITTER` using a statically linked
107
+ jitterentropy library.
108
+
109
+ *Dimitri John Ledkov*
110
+
111
+ * Added a feature to retrieve configured TLS signature algorithms,
112
+ e.g., via the openssl list command.
113
+
114
+ *Michael Baentsch*
115
+
116
+ * Deprecated TS_VERIFY_CTX_set_* functions and added replacement
117
+ TS_VERIFY_CTX_set0_* functions with improved semantics.
118
+
119
+ *Tobias Erbsland*
120
+
32
121
* Redesigned Windows use of OPENSSLDIR/ENGINESDIR/MODULESDIR such that
33
122
what were formerly build time locations can now be defined at run time
34
- with registry keys. See NOTES-WINDOWS.md
123
+ with registry keys. See NOTES-WINDOWS.md.
35
124
36
125
*Neil Horman*
37
126
@@ -63,8 +152,8 @@ OpenSSL 3.4
63
152
64
153
*Tomáš Mráz*
65
154
66
- * Use an empty renegotiate extension in TLS client hellos instead of
67
- the empty renegotiation SCSV, for all connections with a minimum TLS
155
+ * An empty renegotiate extension will be used in TLS client hellos instead
156
+ of the empty renegotiation SCSV, for all connections with a minimum TLS
68
157
version > 1.0.
69
158
70
159
*Tim Perry*
@@ -80,7 +169,14 @@ OpenSSL 3.4
80
169
81
170
This work was sponsored by Siemens AG.
82
171
83
- *Rajeev Ranjan*
172
+ *Rajeev Ranjan*
173
+
174
+ * Added support for issuedOnBehalfOf, auditIdentity, basicAttConstraints,
175
+ userNotice, acceptablePrivilegePolicies, acceptableCertPolicies,
176
+ subjectDirectoryAttributes, associatedInformation, delegatedNameConstraints,
177
+ holderNameConstraints and targetingInformation X.509v3 extensions.
178
+
179
+ *Jonathan M. Wilbur*
84
180
85
181
* Added Attribute Certificate (RFC 5755) support. Attribute
86
182
Certificates can be created, parsed, modified and printed via the
@@ -109,7 +205,31 @@ OpenSSL 3.4
109
205
OpenSSL 3.3
110
206
-----------
111
207
112
- ### Changes between 3.3.0 and 3.3.1 [xx XXX xxxx]
208
+ ### Changes between 3.3.1 and 3.3.2 [xx XXX xxxx]
209
+
210
+ * Fixed possible denial of service in X.509 name checks.
211
+
212
+ Applications performing certificate name checks (e.g., TLS clients checking
213
+ server certificates) may attempt to read an invalid memory address when
214
+ comparing the expected name with an `otherName` subject alternative name of
215
+ an X.509 certificate. This may result in an exception that terminates the
216
+ application program.
217
+
218
+ ([CVE-2024-6119])
219
+
220
+ *Viktor Dukhovni*
221
+
222
+ * Fixed possible buffer overread in SSL_select_next_proto().
223
+
224
+ Calling the OpenSSL API function SSL_select_next_proto with an empty
225
+ supported client protocols buffer may cause a crash or memory contents
226
+ to be sent to the peer.
227
+
228
+ ([CVE-2024-5535])
229
+
230
+ *Matt Caswell*
231
+
232
+ ### Changes between 3.3.0 and 3.3.1 [4 Jun 2024]
113
233
114
234
* Fixed potential use after free after SSL_free_buffers() is called.
115
235
@@ -1108,7 +1228,7 @@ OpenSSL 3.1
1108
1228
1109
1229
* Add FIPS provider configuration option to enforce the
1110
1230
Extended Master Secret (EMS) check during the TLS1_PRF KDF.
1111
- The option '-ems-check ' can optionally be supplied to
1231
+ The option '-ems_check ' can optionally be supplied to
1112
1232
'openssl fipsinstall'.
1113
1233
1114
1234
*Shane Lontis*
@@ -20744,6 +20864,8 @@ ndif
20744
20864
20745
20865
<!-- Links -->
20746
20866
20867
+ [CVE-2024-6119]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-6119
20868
+ [CVE-2024-5535]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-5535
20747
20869
[CVE-2024-4741]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4741
20748
20870
[CVE-2024-4603]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-4603
20749
20871
[CVE-2024-2511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2024-2511
0 commit comments