Skip to content

Comments

[3.6] Update CHANGES.md and NEWS.md in preparation for the 3.6.0 release#28712

Closed
esyr wants to merge 2 commits intoopenssl:openssl-3.6from
esyr:esyr/openssl-3.6.0-changes-news
Closed

[3.6] Update CHANGES.md and NEWS.md in preparation for the 3.6.0 release#28712
esyr wants to merge 2 commits intoopenssl:openssl-3.6from
esyr:esyr/openssl-3.6.0-changes-news

Conversation

@esyr
Copy link
Member

@esyr esyr commented Oct 1, 2025

This includes a forward-port of 3.5.4 CHANGES/NEWS updates, as well as massaging of 3.6 CHANGES/NEWS.

3.5.4 CHANGES.md includes the following:
 * openssl#28415
 * openssl#28573
 * openssl#28603

3.5.4 NEWS.md includes the following:
 * openssl#28603

Release: Yes
Signed-off-by: Eugene Syromiatnikov <[email protected]>

Reviewed-by: Neil Horman <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
@esyr esyr requested review from mattcaswell, nhorman and t8m October 1, 2025 02:56
@esyr esyr added approval: review pending This pull request needs review by a committer triaged: documentation The issue/pr deals with documentation (errors) branch: 3.6 Applies to openssl-3.6 labels Oct 1, 2025
CHANGES.md Outdated
Comment on lines 34 to 86
* Fixed Out-of-bounds read&write in RFC 3211 KEK Unwrap

Issue summary: An application trying to decrypt CMS messages encrypted using
password-based encryption can trigger an out-of-bounds read and write.

Impact summary: This out-of-bounds read may trigger a crash which leads
to Denial of Service for an application. The out-of-bounds write can cause
a memory corruption which can have various consequences, including
a Denial of Service or Execution of attacker-supplied code.

The issue was reported by Stanislav Fort (Aisle Research).

([CVE-2025-9230])

*Viktor Dukhovni*

* Fixed Timing side-channel in SM2 algorithm on 64-bit ARM

Issue summary: A timing side-channel which could potentially allow remote
recovery of the private key exists in the SM2 algorithm implementation
on 64-bit ARM platforms.

Impact summary: A timing side-channel in SM2 signature computations
on 64-bit ARM platforms could allow recovering the private key
by an attacker.

The issue was reported by Stanislav Fort (Aisle Research).

([CVE-2025-9231])

*Stanislav Fort and Tomáš Mráz*

* Fixed Out-of-bounds read in HTTP client `no_proxy` handling

Issue summary: An application using the OpenSSL HTTP client API functions
may trigger an out-of-bounds read if the `no_proxy` environment variable
is set and the host portion of the authority component of the HTTP URL
is an IPv6 address.

Impact summary: An out-of-bounds read can trigger a crash which leads
to Denial of Service for an application.

The issue was reported by Stanislav Fort (Aisle Research).

([CVE-2025-9232])

*Stanislav Fort*

* Fixed the length of the ASN.1 sequence for the SM3 digests of RSA-encrypted
signatures.

*Xiao Lou Dong Feng*

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Everything that is mentioned in 3.5 section should NOT be duplicated here as these are changes between 3.6 and 3.5 NOT 3.6.0 and 3.5.0.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sure, removed the following changes:

@@ -31,86 +31,6 @@ OpenSSL 3.6
 
 ### Changes between 3.5 and 3.6 [xx XXX xxxx]
 
- * Fixed Out-of-bounds read&write in RFC 3211 KEK Unwrap
-
-   Issue summary:  An application trying to decrypt CMS messages encrypted using
-   password-based encryption can trigger an out-of-bounds read and write.
-
-   Impact summary:  This out-of-bounds read may trigger a crash which leads
-   to Denial of Service for an application.  The out-of-bounds write can cause
-   a memory corruption which can have various consequences, including
-   a Denial of Service or Execution of attacker-supplied code.
-
-   The issue was reported by Stanislav Fort (Aisle Research).
-
-   ([CVE-2025-9230])
-
-   *Viktor Dukhovni*
-
- * Fixed Timing side-channel in SM2 algorithm on 64-bit ARM
-
-   Issue summary:  A timing side-channel which could potentially allow remote
-   recovery of the private key exists in the SM2 algorithm implementation
-   on 64-bit ARM platforms.
-
-   Impact summary:  A timing side-channel in SM2 signature computations
-   on 64-bit ARM platforms could allow recovering the private key
-   by an attacker.
-
-   The issue was reported by Stanislav Fort (Aisle Research).
-
-   ([CVE-2025-9231])
-
-   *Stanislav Fort and Tomáš Mráz*
-
- * Fixed Out-of-bounds read in HTTP client `no_proxy` handling
-
-   Issue summary:  An application using the OpenSSL HTTP client API functions
-   may trigger an out-of-bounds read if the `no_proxy` environment variable
-   is set and the host portion of the authority component of the HTTP URL
-   is an IPv6 address.
-
-   Impact summary:  An out-of-bounds read can trigger a crash which leads
-   to Denial of Service for an application.
-
-   The issue was reported by Stanislav Fort (Aisle Research).
-
-   ([CVE-2025-9232])
-
-   *Stanislav Fort*
-
- * Fixed the length of the ASN.1 sequence for the SM3 digests of RSA-encrypted
-   signatures.
-
-   *Xiao Lou Dong Feng*
-
- * Secure memory allocation calls are no longer used for HMAC keys.
-
-   *Dr Paul Dale*
-
- * `openssl req` no longer generates certificates with an empty extension list
-   when SKID/AKID are set to `none` during generation.
-
-   *David Benjamin*
-
- * The man page date is now derived from the release date provided
-   in `VERSION.dat` and not the current date for the released builds.
-
-   *Enji Cooper*
-
  * Added support for `EVP_SKEY` opaque symmetric key objects to the key
    derivation and key exchange provider methods.  Added
    `EVP_KDF_CTX_set_SKEY()`, `EVP_KDF_derive_SKEY()`,
@@ -122,10 +42,6 @@ OpenSSL 3.6
 
    *Dr Paul Dale*
 
- * Added FIPS 140-3 PCT on DH key generation.
-
-   *Nikola Pajkovský*
-
  * Added `i2d_PKCS8PrivateKey(3)` API to complement `i2d_PrivateKey(3)`,
    the former always outputs PKCS#8.
 

news:

@@ -29,17 +29,6 @@ OpenSSL 3.6
 This release incorporates the following potentially significant or incompatible
 changes:
 
-  * Fixed Out-of-bounds read&write in RFC 3211 KEK Unwrap.
-    ([CVE-2025-9230])
-
-  * Fixed Timing side-channel in SM2 algorithm on 64-bit ARM.
-    ([CVE-2025-9231])
-
-  * Fixed Out-of-bounds read in HTTP client `no_proxy` handling.
-    ([CVE-2025-9232])
-
-  * Added FIPS 140-3 PCT on DH key generation.
-
   * Added NIST security categories for PKEY objects.
 
   * Added support for `EVP_SKEY` opaque symmetric key objects to the key

@esyr esyr force-pushed the esyr/openssl-3.6.0-changes-news branch from 0fd99e9 to 6602d83 Compare October 1, 2025 08:54
 * Add the release date for 3.5.4
 * Various touch-ups aimed at improving consistency of the news
 * ffixes, wfixes

Release: Yes
Signed-off-by: Eugene Syromiatnikov <[email protected]>
@esyr esyr force-pushed the esyr/openssl-3.6.0-changes-news branch from 6602d83 to 09e11f7 Compare October 1, 2025 08:58
@esyr esyr requested a review from t8m October 1, 2025 08:59
@t8m t8m added the tests: exempted The PR is exempt from requirements for testing label Oct 1, 2025
@nhorman nhorman added approval: done This pull request has the required number of approvals approval: ready to merge The 24 hour grace period has passed, ready to merge and removed approval: review pending This pull request needs review by a committer approval: done This pull request has the required number of approvals labels Oct 1, 2025
@nhorman
Copy link
Contributor

nhorman commented Oct 1, 2025

merged

@nhorman nhorman closed this Oct 1, 2025
openssl-machine pushed a commit that referenced this pull request Oct 1, 2025
3.5.4 CHANGES.md includes the following:
 * #28415
 * #28573
 * #28603

3.5.4 NEWS.md includes the following:
 * #28603

Release: Yes
Signed-off-by: Eugene Syromiatnikov <[email protected]>

Reviewed-by: Neil Horman <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from #28712)
openssl-machine pushed a commit that referenced this pull request Oct 1, 2025
 * Add the release date for 3.5.4
 * Various touch-ups aimed at improving consistency of the news
 * ffixes, wfixes

Release: Yes
Signed-off-by: Eugene Syromiatnikov <[email protected]>

Reviewed-by: Neil Horman <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from #28712)
esyr added a commit to esyr/openssl that referenced this pull request Oct 2, 2025
3.5.4 CHANGES.md includes the following:
 * openssl#28415
 * openssl#28573
 * openssl#28603

3.5.4 NEWS.md includes the following:
 * openssl#28603

Release: Yes
Signed-off-by: Eugene Syromiatnikov <[email protected]>

Reviewed-by: Neil Horman <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from openssl#28712)
esyr added a commit to esyr/openssl that referenced this pull request Oct 2, 2025
 * Add the release date for 3.5.4
 * Various touch-ups aimed at improving consistency of the news
 * ffixes, wfixes

Release: Yes
Signed-off-by: Eugene Syromiatnikov <[email protected]>

Reviewed-by: Neil Horman <[email protected]>
Reviewed-by: Tomas Mraz <[email protected]>
(Merged from openssl#28712)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approval: ready to merge The 24 hour grace period has passed, ready to merge branch: 3.6 Applies to openssl-3.6 tests: exempted The PR is exempt from requirements for testing triaged: documentation The issue/pr deals with documentation (errors)

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants