OpenSSL 3.2 Series Release Notes
The major changes and known issues for the 3.2 branch of the
OpenSSL toolkit are summarised below. The contents reflect the
current state of the NEWS
file inside the git repository. More details can be found in the
ChangeLog.
Major changes between OpenSSL 3.2.5 and OpenSSL 3.2.6 [30 Sep 2025]
OpenSSL 3.2.6 is a security patch release. The most severe CVE fixed in this release is Moderate.
This release incorporates the following bug fixes and mitigations:
-
Fix Out-of-bounds read & write in RFC 3211 KEK Unwrap. (CVE-2025-9230)
-
Fix Timing side-channel in SM2 algorithm on 64 bit ARM. (CVE-2025-9231)
-
Fix Out-of-bounds read in HTTP client no_proxy handling. (CVE-2025-9232)
Major changes between OpenSSL 3.2.4 and OpenSSL 3.2.5 [1 Jul 2025]
OpenSSL 3.2.5 is a bug fix release.
This release incorporates the following bug fixes and mitigations:
- Miscellaneous minor bug fixes.
Major changes between OpenSSL 3.2.3 and OpenSSL 3.2.4 [11 Feb 2025]
OpenSSL 3.2.4 is a security patch release. The most severe CVE fixed in this release is High.
This release incorporates the following bug fixes and mitigations:
-
Fixed RFC7250 handshakes with unauthenticated servers don’t abort as expected. (CVE-2024-12797)
-
Fixed timing side-channel in ECDSA signature computation. (CVE-2024-13176)
-
Fixed possible OOB memory access with invalid low-level GF(2^m) elliptic curve parameters. (CVE-2024-9143)
Major changes between OpenSSL 3.2.2 and OpenSSL 3.2.3 [3 Sep 2024]
OpenSSL 3.2.3 is a security patch release. The most severe CVE fixed in this release is Moderate.
This release incorporates the following bug fixes and mitigations:
-
Fixed possible denial of service in X.509 name checks (CVE-2024-6119)
-
Fixed possible buffer overread in SSL_select_next_proto() (CVE-2024-5535)
Major changes between OpenSSL 3.2.1 and OpenSSL 3.2.2 [4 Jun 2024]
OpenSSL 3.2.2 is a security patch release. The most severe CVE fixed in this release is Low.
This release incorporates the following bug fixes and mitigations:
-
Fixed potential use after free after SSL_free_buffers() is called (CVE-2024-4741)
-
Fixed an issue where checking excessively long DSA keys or parameters may be very slow (CVE-2024-4603)
-
Fixed unbounded memory growth with session handling in TLSv1.3 (CVE-2024-2511)
Major changes between OpenSSL 3.2.0 and OpenSSL 3.2.1 [30 Jan 2024]
OpenSSL 3.2.1 is a security patch release. The most severe CVE fixed in this release is Low.
This release incorporates the following bug fixes and mitigations:
- Fixed PKCS12 Decoding crashes (CVE-2024-0727)
- Fixed excessive time spent checking invalid RSA public keys (CVE-2023-6237)
- Fixed POLY1305 MAC implementation corrupting vector registers on PowerPC CPUs which support PowerISA 2.07 (CVE-2023-6129)
Major changes between OpenSSL 3.1 and OpenSSL 3.2.0 [23 Nov 2023]
OpenSSL 3.2.0 is a feature release adding significant new functionality to OpenSSL.
This release incorporates the following potentially significant or incompatible changes:
-
The default SSL/TLS security level has been changed from 1 to 2.
-
The
x509,ca, andreqapps now always produce X.509v3 certificates. -
Subject or issuer names in X.509 objects are now displayed as UTF-8 strings by default. Also spaces surrounding
=in DN output are removed.
This release adds the following new features:
-
Support for client side QUIC, including support for multiple streams (RFC 9000)
-
Support for Ed25519ctx, Ed25519ph and Ed448ph in addition to existing support for Ed25519 and Ed448 (RFC 8032)
-
Support for deterministic ECDSA signatures (RFC 6979)
-
Support for AES-GCM-SIV, a nonce-misuse-resistant AEAD (RFC 8452)
-
Support for the Argon2 KDF, along with supporting thread pool functionality (RFC 9106)
-
Support for Hybrid Public Key Encryption (HPKE) (RFC 9180)
-
Support for SM4-XTS
-
Support for Brainpool curves in TLS 1.3
-
Support for TLS Raw Public Keys (RFC 7250)
-
Support for TCP Fast Open on Linux, macOS and FreeBSD, where enabled and supported (RFC 7413)
-
Support for TLS certificate compression, including library support for zlib, Brotli and zstd (RFC 8879)
-
Support for provider-based pluggable signature algorithms in TLS 1.3 with supporting CMS and X.509 functionality
With a suitable provider this enables the use of post-quantum/quantum-safe cryptography.
-
Support for using the Windows system certificate store as a source of trusted root certificates
This is not yet enabled by default and must be activated using an environment variable. This is likely to become enabled by default in a future feature release.
-
Support for using the IANA standard names in TLS ciphersuite configuration
-
Multiple new features and improvements to CMP protocol support
The following known issues are present in this release and will be rectified in a future release:
- Provider-based signature algorithms cannot be configured using the SignatureAlgorithms configuration file parameter (#22761)
This release incorporates the following documentation enhancements:
-
Added multiple tutorials on the OpenSSL library and in particular on writing various clients (using TLS and QUIC protocols) with libssl
See OpenSSL Guide.
This release incorporates the following bug fixes and mitigations:
- Fixed excessive time spent in DH check / generation with large Q parameter value (CVE-2023-5678)
A more detailed list of changes in this release can be found in the CHANGES.md file.
Users interested in using the new QUIC functionality are encouraged to read the README file for QUIC, which provides links to relevant documentation and example code.
As always, bug reports and issues relating to OpenSSL can be filed on our issue tracker.
- Changelog
- CVEs and the FIPS provider
- News
- OpenSSL 1.1.1 Series Release Notes
- OpenSSL 3.0 Series Release Notes
- OpenSSL 3.1 Series Release Notes
- OpenSSL 3.2 Series Release Notes
- OpenSSL 3.3 Series Release Notes
- OpenSSL 3.4 Series Release Notes
- OpenSSL 3.5 Series Release Notes
- OpenSSL 3.6 Series Release Notes
- Release and Advisory Timeline
- Security advisory list (json)
- Security advisory list (txt)
- Vulnerabilities
- Vulnerabilities 0.9.6
- Vulnerabilities 0.9.7
- Vulnerabilities 0.9.8
- Vulnerabilities 1.0.0
- Vulnerabilities 1.0.1
- Vulnerabilities 1.0.2
- Vulnerabilities 1.1.0
- Vulnerabilities 1.1.1
- Vulnerabilities 3.0
- Vulnerabilities 3.1
- Vulnerabilities 3.2
- Vulnerabilities 3.3
- Vulnerabilities 3.4
- Vulnerabilities 3.5
- Top of News