Back
OpenSSL Win64 Installer Team
Patches for OpenSSL LTS x86 EXE
Windows
8 patches available
The OpenSSL Installation Project is dedicated to providing a simple installation of OpenSSL for Microsoft Windows. It is easy to set up and easy to use through the simple, effective installer. No need to compile anything or jump through any hoops, just click a few times and it is installed, leaving you to doing real work.
OpenSSL LTS x86 EXE Version 3.5.4
Release Date
9/30/2025
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
Changes between 3.5.3 and 3.5.4 [30 Sep 2025]$$$Fix Out-of-bounds read & write in RFC 3211 KEK Unwrap$$$$$$Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write.$$$$$$Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code.$$$$$$The issue was reported by Stanislav Fort (Aisle Research).$$$$$$(CVE-2025-9230)$$$$$$Viktor Dukhovni$$$$$$Fix Timing side-channel in SM2 algorithm on 64 bit ARM$$$$$$Issue summary: A timing side-channel which could potentially allow remote recovery of the private key exists in the SM2 algorithm implementation on 64 bit ARM platforms.$$$$$$Impact summary: A timing side-channel in SM2 signature computations on 64 bit ARM platforms could allow recovering the private key by an attacker.$$$$$$The issue was reported by Stanislav Fort (Aisle Research).$$$$$$(CVE-2025-9231)
OpenSSL LTS x86 EXE Version 3.5.4
Release Date
9/30/2025
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
Changes between 3.5.3 and 3.5.4 [30 Sep 2025]$$$Fix Out-of-bounds read & write in RFC 3211 KEK Unwrap$$$$$$Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write.$$$$$$Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code.$$$$$$The issue was reported by Stanislav Fort (Aisle Research).$$$$$$(CVE-2025-9230)$$$$$$Viktor Dukhovni$$$$$$Fix Timing side-channel in SM2 algorithm on 64 bit ARM$$$$$$Issue summary: A timing side-channel which could potentially allow remote recovery of the private key exists in the SM2 algorithm implementation on 64 bit ARM platforms.$$$$$$Impact summary: A timing side-channel in SM2 signature computations on 64 bit ARM platforms could allow recovering the private key by an attacker.$$$$$$The issue was reported by Stanislav Fort (Aisle Research).$$$$$$(CVE-2025-9231)
OpenSSL LTS x86 EXE Version 3.5.2
Release Date
8/5/2025
Bug Fix?
No
Minor Release?
Yes
Patch Notes
Changes between 3.5.1 and 3.5.2 [5 Aug 2025]$$$The FIPS provider now performs a PCT on key import for RSA; EC and ECX. This is mandated by FIPS 140-3 IG 10.3.A additional comment 1.$$$Dr Paul Dale
OpenSSL LTS x86 EXE Version 3.5.2
Release Date
8/5/2025
Bug Fix?
No
Minor Release?
Yes
Patch Notes
Changes between 3.5.1 and 3.5.2 [5 Aug 2025]$$$The FIPS provider now performs a PCT on key import for RSA; EC and ECX. This is mandated by FIPS 140-3 IG 10.3.A additional comment 1.$$$Dr Paul Dale
OpenSSL LTS x86 EXE Version 3.5.2
Release Date
8/5/2025
Bug Fix?
No
Minor Release?
Yes
Patch Notes
Changes between 3.5.1 and 3.5.2 [5 Aug 2025]$$$The FIPS provider now performs a PCT on key import for RSA; EC and ECX. This is mandated by FIPS 140-3 IG 10.3.A additional comment 1.$$$Dr Paul Dale
OpenSSL LTS x86 EXE Version 3.5.1
Release Date
7/1/2025
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
Release notes are not yet updated$$$https://openssl-library.org/news/changelog/index.html
OpenSSL LTS x86 EXE Version 3.5.1
Release Date
7/1/2025
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
Release notes are not yet updated$$$https://openssl-library.org/news/changelog/index.html
OpenSSL LTS x86 EXE Version 3.5.0
Release Date
4/9/2025
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
Release notes are not yet updated$$$https://openssl-library.org/news/changelog/index.html
OpenSSL LTS x86 EXE Version 3.5.0
Release Date
4/9/2025
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
Release notes are not yet updated$$$https://openssl-library.org/news/changelog/index.html
OpenSSL LTS x86 EXE Version 3.5.0
Release Date
4/9/2025
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
Release notes are not yet updated$$$https://openssl-library.org/news/changelog/index.html
OpenSSL LTS x86 EXE Version 3.0.15
Release Date
10/22/2024
Bug Fix?
No
Minor Release?
No
Patch Notes
Major changes between OpenSSL 3.0.14 and OpenSSL 3.0.15 [3 Sep 2024]$$$OpenSSL 3.0.15 is a security patch release. The most severe CVE fixed in this release is Moderate.$$$$$$This release incorporates the following bug fixes and mitigations:$$$$$$Fixed possible denial of service in X.509 name checks ([CVE-2024-6119])$$$Fixed possible buffer overread in SSL_select_next_proto() ([CVE-2024-5535])
OpenSSL LTS x86 EXE Version 3.0.13
Release Date
1/30/2024
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
No Proper release notes found$$$$$$November 30; 2023 - OpenSSL 3.2 is available. Users should currently install a 3.x series and generally only need a Light edition. All application developers should have migrated their applications to use the OpenSSL 3.x series. Note that 3.0.x is a LTS release series while 3.2.x is not.$$$March 14; 2023 - OpenSSL 3.1 is available. Also; Happy Pi Day. Users should currently install a 1.1.1 series + a 3.x series for maximum application compatibility. All application developers should begin migrating their applications to use the OpenSSL 3.x series. Note that 3.0.x is a LTS release series while 3.1.x is not.$$$Refer-https://slproweb.com/products/Win32OpenSSL.html
OpenSSL LTS x86 EXE Version 3.0.12
Release Date
11/2/2023
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
No Proper release notes found$$$$$$September 9; 2021 - OpenSSL 3.0 is available. Users should currently install a 1.1.1 series + a 3.0 series for maximum application compatibility. All application developers should begin migrating their applications to use OpenSSL 3.0 series. Experimental; tested ARM64 builds are now available. Most users only need to install OpenSSL Light editions. The full downloads for 3.0; which include the precompiled developer libraries and a bloated test suite; have nearly doubled in size from 1.1.1 series.$$$$$$Refer-https://slproweb.com/products/Win32OpenSSL.html
OpenSSL LTS x86 EXE Version 3.0.11
Release Date
9/9/2021
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
No Proper release notes found$$$$$$September 9; 2021 - OpenSSL 3.0 is available. Users should currently install a 1.1.1 series + a 3.0 series for maximum application compatibility. All application developers should begin migrating their applications to use OpenSSL 3.0 series. Experimental; tested ARM64 builds are now available. Most users only need to install OpenSSL Light editions. The full downloads for 3.0; which include the precompiled developer libraries and a bloated test suite; have nearly doubled in size from 1.1.1 series.$$$$$$Refer-https://slproweb.com/products/Win32OpenSSL.html
Interested in automating patching for OpenSSL LTS x86 EXE?