@@ -28,6 +28,56 @@ OpenSSL Releases
2828OpenSSL 3.5
2929-----------
3030
31+ ### Changes between 3.5.2 and 3.5.3 [16 Sep 2025]
32+
33+ * Avoided a potential race condition introduced in 3.5.1, where
34+ `OSSL_STORE_CTX` kept open during lookup while potentially being used
35+ by multiple threads simultaneously, that could lead to potential crashes
36+ when multiple concurrent TLS connections are served.
37+
38+ *Matt Caswell*
39+
40+ * The FIPS provider no longer performs a PCT on key import for RSA, DH,
41+ and EC keys (that was introduced in 3.5.2), following the latest update
42+ on that requirement in FIPS 140-3 IG 10.3.A additional comment 1.
43+
44+ *Dr Paul Dale*
45+
46+ * Secure memory allocation calls are no longer used for HMAC keys.
47+
48+ *Dr Paul Dale*
49+
50+ * `openssl req` no longer generates certificates with an empty extension list
51+ when SKID/AKID are set to `none` during generation.
52+
53+ *David Benjamin*
54+
55+ * The man page date is now derived from the release date provided
56+ in `VERSION.dat` and not the current date for the released builds.
57+
58+ *Enji Cooper*
59+
60+ * Hardened the provider implementation of the RSA public key "encrypt"
61+ operation to add a missing check that the caller-indicated output buffer
62+ size is at least as large as the byte count of the RSA modulus. The issue
63+ was reported by Arash Ale Ebrahim from SYSPWN.
64+
65+ This operation is typically invoked via `EVP_PKEY_encrypt(3)`. Callers that
66+ in fact provide a sufficiently large buffer, but fail to correctly indicate
67+ its size may now encounter unexpected errors. In applications that attempt
68+ RSA public encryption into a buffer that is too small, an out-of-bounds
69+ write is now avoided and an error is reported instead.
70+
71+ *Viktor Dukhovni*
72+
73+ * Added FIPS 140-3 PCT on DH key generation.
74+
75+ *Nikola Pajkovsky*
76+
77+ * Fixed the synthesised `OPENSSL_VERSION_NUMBER`.
78+
79+ *Richard Levitte*
80+
3181### Changes between 3.5.1 and 3.5.2 [5 Aug 2025]
3282
3383 * The FIPS provider now performs a PCT on key import for RSA, EC and ECX.
0 commit comments