Latest development in branch 1.1.1
1.1.1w
Released 12 Sep 2023
(2 years ago)
SoftwareOpenSSL
Branch1.1.1
StatusLTS
End of life
Initial release1.1.1
11 Sep 2018
(7 years ago)
Latest release1.1.1w
12 Sep 2023
(2 years ago)
End of
OSS support
11 Sep 2023
(Ended 2 years, 8 months ago)
Premium supportYes
Release noteshttps://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1w
Source codehttps://github.com/openssl/openssl/tree/OpenSSL_1_1_1w
Downloadhttps://github.com/openssl/openssl/releases/tag/OpenSSL_1_1_1w
OpenSSL 1.1.1 ReleasesView full list

What Is New in OpenSSL 1.1.1

Category Highlights
Security Fixes
  • POLY1305 XMM register corruption on Windows (CVE-2023-4807)
  • DH parameter validation time-outs (CVE-2023-3817, CVE-2023-3446)
  • RSA decryption timing oracle (CVE-2022-4304)
  • Use-after-free in BIO_new_NDEF (CVE-2023-0215)
  • Double free in PEM_read_bio_ex (CVE-2022-4450)
  • Various ASN.1 string overruns (CVE-2021-3712)
Performance Improvements
  • Reduced DH q-parameter check latency
  • Mitigated pathological OBJ_obj2txt() slowdown
  • Limited node creation in X.509 policy trees
Platform Compatibility Fixes
  • Fixed POLY1305 register handling on Windows
  • Corrected AES-OCB encryption on 32-bit x86 (CVE-2022-2097)
  • Sanitized shell metacharacters in c_rehash script (CVE-2022-1292, CVE-2022-2068)
  • Added missing memcmp header for certain builds
Certificate & Policy Hardening
  • Fixed X.400 address type confusion in GeneralName (CVE-2023-0286)
  • Improved handling of invalid leaf certificate policies (CVE-2023-0465)
  • Corrected documentation and behavior of X509_VERIFY_PARAM_add0_policy (CVE-2023-0466)
  • Fixed regression that prevented certificate data refresh before signing

How does OpenSSL 1.1.1 address recent security vulnerabilities?

OpenSSL 1.1.1 incorporates a series of security patches that fix critical CVEs across cryptographic primitives and protocol handling.

  • POLY1305 MAC implementation now preserves XMM registers on Windows (CVE-2023-4807).
  • DH parameter checks no longer consume excessive CPU time for large moduli (CVE-2023-3817, CVE-2023-3446).
  • RSA decryption timing side-channel has been mitigated (CVE-2022-4304).
  • Use-after-free bugs in BIO_new_NDEF and double-free in PEM_read_bio_ex have been eliminated (CVE-2023-0215, CVE-2022-4450).
  • Multiple ASN.1 string buffer overruns were patched (CVE-2021-3712).

What performance improvements are included in the latest OpenSSL 1.1.1 releases?

Recent OpenSSL 1.1.1 updates trim down costly operations that could stall high-throughput services.

  • DH q-parameter validation now exits early, preventing minutes-long hangs on malformed keys.
  • OBJ_obj2txt() has a guard against gigantic OID components, restoring linear performance (CVE-2023-2650).
  • The X.509 policy tree construction caps node creation, avoiding exponential blow-up (CVE-2023-0464).

Which platform-specific bugs were fixed in OpenSSL 1.1.1?

OpenSSL 1.1.1 now runs reliably on a broader set of operating systems and architectures.

  • Windows builds no longer corrupt XMM registers during POLY1305 operations.
  • AES-OCB encryption on 32-bit x86 platforms correctly processes all bytes (CVE-2022-2097).
  • The c_rehash utility sanitises shell metacharacters, preventing command-injection attacks (CVE-2022-1292, CVE-2022-2068).
  • A missing memcmp header was added to avoid compilation failures on niche platforms.

How have certificate and policy handling been hardened in OpenSSL 1.1.1?

Certificate processing now follows stricter validation rules to reduce the attack surface.

  • X.400 address type confusion in GeneralName has been fixed (CVE-2023-0286).
  • Invalid certificate policies in leaf certificates are now rejected (CVE-2023-0465).
  • Documentation and runtime behavior of X509_VERIFY_PARAM_add0_policy were aligned (CVE-2023-0466).
  • A regression that skipped refreshing certificate data before signing was corrected.
openssl version -a

FAQ

Do I need to rebuild my applications after upgrading to OpenSSL 1.1.1?
Most binaries will continue to work unchanged unless they depend on symbols that were removed or altered in the security patches.

Which command shows the OpenSSL version and build options?
Run openssl version -a to display the full version string and compile-time configuration.

Will the DH parameter performance fix affect existing key files?
The fix only changes the validation path; existing DH keys remain compatible.

Is the POLY1305 Windows fix relevant for Linux deployments?
No, the register corruption issue was specific to the Windows assembler implementation.

Can the c_rehash sanitisation change affect my existing shell scripts?
Scripts that relied on unsanitised output may need to quote the filenames returned by c_rehash.

Are there any new runtime configuration options introduced in these releases?
No new configuration directives were added; the changes are all internal patches and bug fixes.

Releases In Branch 1.1.1

VersionRelease date
1.1.1w12 Sep 2023
(2 years ago)
1.1.1v01 Aug 2023
(2 years ago)
1.1.1u30 May 2023
(2 years ago)
1.1.1t07 Feb 2023
(3 years ago)
1.1.1s01 Nov 2022
(3 years ago)
1.1.1r11 Oct 2022
(3 years ago)
1.1.1q05 Jul 2022
(3 years ago)
1.1.1p21 Jun 2022
(3 years ago)
1.1.1o03 May 2022
(4 years ago)
1.1.1n15 Mar 2022
(4 years ago)
1.1.1m14 Dec 2021
(4 years ago)
1.1.1l24 Aug 2021
(4 years ago)
1.1.1k25 Mar 2021
(5 years ago)
1.1.1j16 Feb 2021
(5 years ago)
1.1.1i08 Dec 2020
(5 years ago)
1.1.1h22 Sep 2020
(5 years ago)
1.1.1g21 Apr 2020
(6 years ago)
1.1.1f31 Mar 2020
(6 years ago)
1.1.1e17 Mar 2020
(6 years ago)
1.1.1d10 Sep 2019
(6 years ago)
1.1.1c28 May 2019
(6 years ago)
1.1.1b26 Feb 2019
(7 years ago)
1.1.1a20 Nov 2018
(7 years ago)
1.1.111 Sep 2018
(7 years ago)
1.1.1-pre921 Aug 2018
(7 years ago)
1.1.1-pre820 Jun 2018
(7 years ago)
1.1.1-pre729 May 2018
(7 years ago)
1.1.1-pre601 May 2018
(8 years ago)
1.1.1-pre517 Apr 2018
(8 years ago)
1.1.1-pre403 Apr 2018
(8 years ago)
1.1.1-pre320 Mar 2018
(8 years ago)
1.1.1-pre227 Feb 2018
(8 years ago)
1.1.1-pre115 Feb 2018
(8 years ago)