<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title><![CDATA[wolfSSL - Embedded SSL Library — wolfSSL 5.9.1 release blog]]></title>
		<link>https://www.wolfssl.com/forums/topic2509-wolfssl-591-release-blog.html</link>
		<atom:link href="https://www.wolfssl.com/forums/feed-rss-topic2509.xml" rel="self" type="application/rss+xml" />
		<description><![CDATA[The most recent posts in wolfSSL 5.9.1 release blog.]]></description>
		<lastBuildDate>Tue, 21 Apr 2026 23:15:40 +0000</lastBuildDate>
		<generator>PunBB</generator>
		<item>
			<title><![CDATA[wolfSSL 5.9.1 release blog]]></title>
			<link>https://www.wolfssl.com/forums/post8793.html#p8793</link>
			<description><![CDATA[<p><a href="https://www.wolfssl.com/products/wolfssl/">wolfSSL 5.9.1</a> is available with new features, post-quantum cryptography improvements, broad bug fixes, and a number of vulnerability fixes. Users are always recommended to stay up to date with wolfSSL releases. In this release, use cases that are affected by high severity reports are: PKCS7 with ORI callback set or AuthEnvelopedData with AES-GCM (–enable-pkcs7), ECDSA certificate verification with EdDSA or ML-DSA enabled, URI nameConstraints enforcement with intermediate CAs, X.509 certificate conversion via CertFromX509 with AuthorityKeyIdentifier, DTLS 1.3 (–enable-dtls13), ECH (–enable-ech), ECCSI signature verification (–enable-eccsi), AES-EAX/CMAC with large messages, and ChaCha20-Poly1305 via EVP or X509_verify_cert via the OpenSSL compatibility layer (–enable-opensslextra).</p><p><strong>Security Vulnerabilities Addressed</strong><br />This release addresses 22 CVEs across critical, high, medium, and low severity levels. Notably, we have received many quality AI-assisted vulnerability reports this cycle. Thanks to all the researchers who responsibly disclosed issues, including teams from Anthropic, KENTECH, Calif.io, eWalker Consulting, and several independent contributors.</p><p>For the full list of vulnerabilities addressed, visit the <a href="https://www.wolfssl.com/docs/security-vulnerabilities/">wolfSSL Vulnerability Page</a>.</p><p><strong>Default Build Changes</strong><br /></p><ul><li><p><strong>ML-KEM (FIPS 203) enabled by default</strong> — Post-quantum key encapsulation is now on by default, making it easier than ever to adopt quantum-resistant cryptography.</p></li></ul><ul><li><p>ECC curve validation is now enabled unconditionally in default builds, removing the previous dependency on USE_ECC_B_PARAM.</p></li></ul><p><strong>New Features</strong><br /></p><ul><li><p><strong>Brainpool curve support</strong> added to wolfSSL_CTX_set1_sigalgs_list for broader European cryptographic standard compatibility.</p></li></ul><ul><li><p><strong>DTLS 1.3 / TLS 1.3 write-dup support</strong> — Duplicate SSL functionality allows read-side delegation of post-handshake tasks (KeyUpdate, ACK, post-handshake auth) to the write-side.</p></li></ul><p><strong>Post-Quantum Cryptography Updates</strong><br /></p><ul><li><p>The context-aware FIPS 204 ML-DSA (Dilithium) API is now the default, with the legacy non-context API gated behind WOLFSSL_DILITHIUM_NO_CTX.</p></li></ul><ul><li><p>Sensitive memory buffers in the ML-DSA implementation are now zeroized to prevent leakage of cryptographic material.</p></li></ul><ul><li><p>Private key validation checks added for Ed25519, Ed448, ML-DSA, and ML-KEM operations.</p></li></ul><ul><li><p>Buffer size and callback validation added to wc_LmsKey_Sign.</p></li></ul><ul><li><p>Fixed out-of-bounds shift and undefined behavior issues in ML-DSA and SLH-DSA implementations.</p></li></ul><p><strong>TLS and DTLS Improvements</strong><br /></p><ul><li><p>Fixed DTLS 1.3 ServerHello to comply with the specification by not echoing legacy_session_id.</p></li></ul><ul><li><p>Fixed TLS 1.3 server to correctly reject mismatched ciphersuites in second ClientHello after HelloRetryRequest.</p></li></ul><ul><li><p>Resolved multiple correctness issues in DTLS 1.3 and TLS 1.3 including missing bounds checks, PSK identity buffer overreads, and resource leaks.</p></li></ul><ul><li><p>HPKE implementation fixes and refactoring with tests for all 24 algorithm combination variants.</p></li></ul><p><strong>Hardware and Embedded Ports</strong><br /></p><ul><li><p>SE050 hardware security module integration fixes for RSA-PSS and persistent key slot management.</p></li></ul><ul><li><p>Broad correctness improvements across Espressif, Renesas, Silicon Labs, NXP, STM32, TI, Xilinx, and other hardware targets.</p></li></ul><ul><li><p>Fixed buffer overflows, key material exposure, mutex leaks, and logic errors across hardware crypto backends.</p></li></ul><p><strong>Rust Wrapper</strong><br /></p><ul><li><p>Released version 1.2.0 of the wolfssl-wolfcrypt Rust crate.</p></li></ul><ul><li><p>Updated build script to support cross-compiling and bare-metal targets including RISC-V architectures.</p></li></ul><p><strong>Get the Update</strong><br />We recommend all wolfSSL users update to version 5.9.1. Dive into the full <a href="https://github.com/wolfSSL/wolfssl">ChangeLog</a> for a complete list of changes.</p><p><strong><a href="https://www.wolfssl.com/download/">Download</a> wolfSSL 5.9.1</strong></p><p>If you have questions about any of the above, please contact us at <a href="mailto:facts@wolfssl.com">facts@wolfssl.com</a> or call us at +1 425 245 8247.</p>]]></description>
			<author><![CDATA[null@example.com (shizuka)]]></author>
			<pubDate>Tue, 21 Apr 2026 23:15:40 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post8793.html#p8793</guid>
		</item>
	</channel>
</rss>
