<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">regclient-0.10.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:15723-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-11-10T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-11-10T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-11-10T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">regclient-0.10.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the regclient-0.10.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-15723</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-47912/</URL>
      <Description>SUSE CVE CVE-2025-47912 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58183/</URL>
      <Description>SUSE CVE CVE-2025-58183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58185/</URL>
      <Description>SUSE CVE CVE-2025-58185 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58186/</URL>
      <Description>SUSE CVE CVE-2025-58186 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58187/</URL>
      <Description>SUSE CVE CVE-2025-58187 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58188/</URL>
      <Description>SUSE CVE CVE-2025-58188 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58189/</URL>
      <Description>SUSE CVE CVE-2025-58189 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-61723/</URL>
      <Description>SUSE CVE CVE-2025-61723 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-9230/</URL>
      <Description>SUSE CVE CVE-2025-9230 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-9231/</URL>
      <Description>SUSE CVE CVE-2025-9231 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-9232/</URL>
      <Description>SUSE CVE CVE-2025-9232 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="regclient-0.10.0-1.1">
      <FullProductName ProductID="regclient-0.10.0-1.1">regclient-0.10.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="regclient-bash-completion-0.10.0-1.1">
      <FullProductName ProductID="regclient-bash-completion-0.10.0-1.1">regclient-bash-completion-0.10.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="regclient-fish-completion-0.10.0-1.1">
      <FullProductName ProductID="regclient-fish-completion-0.10.0-1.1">regclient-fish-completion-0.10.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="regclient-zsh-completion-0.10.0-1.1">
      <FullProductName ProductID="regclient-zsh-completion-0.10.0-1.1">regclient-zsh-completion-0.10.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="regclient-0.10.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:regclient-0.10.0-1.1">regclient-0.10.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="regclient-bash-completion-0.10.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:regclient-bash-completion-0.10.0-1.1">regclient-bash-completion-0.10.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="regclient-fish-completion-0.10.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:regclient-fish-completion-0.10.0-1.1">regclient-fish-completion-0.10.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="regclient-zsh-completion-0.10.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:regclient-zsh-completion-0.10.0-1.1">regclient-zsh-completion-0.10.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: "http://[::1]/". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.</Note>
    </Notes>
    <CVE>CVE-2025-47912</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:regclient-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-bash-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-fish-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-zsh-completion-0.10.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-47912.html</URL>
        <Description>CVE-2025-47912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251257</URL>
        <Description>SUSE Bug 1251257</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.</Note>
    </Notes>
    <CVE>CVE-2025-58183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:regclient-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-bash-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-fish-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-zsh-completion-0.10.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58183.html</URL>
        <Description>CVE-2025-58183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251261</URL>
        <Description>SUSE Bug 1251261</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.</Note>
    </Notes>
    <CVE>CVE-2025-58185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:regclient-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-bash-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-fish-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-zsh-completion-0.10.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58185.html</URL>
        <Description>CVE-2025-58185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251258</URL>
        <Description>SUSE Bug 1251258</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.</Note>
    </Notes>
    <CVE>CVE-2025-58186</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:regclient-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-bash-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-fish-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-zsh-completion-0.10.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58186.html</URL>
        <Description>CVE-2025-58186</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251259</URL>
        <Description>SUSE Bug 1251259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to the design of the name constraint checking algorithm, the processing time of some inputs scals non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.</Note>
    </Notes>
    <CVE>CVE-2025-58187</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:regclient-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-bash-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-fish-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-zsh-completion-0.10.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58187.html</URL>
        <Description>CVE-2025-58187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251254</URL>
        <Description>SUSE Bug 1251254</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.</Note>
    </Notes>
    <CVE>CVE-2025-58188</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:regclient-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-bash-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-fish-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-zsh-completion-0.10.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58188.html</URL>
        <Description>CVE-2025-58188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251260</URL>
        <Description>SUSE Bug 1251260</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.</Note>
    </Notes>
    <CVE>CVE-2025-58189</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:regclient-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-bash-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-fish-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-zsh-completion-0.10.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58189.html</URL>
        <Description>CVE-2025-58189</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251255</URL>
        <Description>SUSE Bug 1251255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.</Note>
    </Notes>
    <CVE>CVE-2025-61723</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:regclient-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-bash-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-fish-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-zsh-completion-0.10.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-61723.html</URL>
        <Description>CVE-2025-61723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251256</URL>
        <Description>SUSE Bug 1251256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Issue summary: An application trying to decrypt CMS messages encrypted using
password based encryption can trigger an out-of-bounds read and write.

Impact summary: This out-of-bounds read may trigger a crash which leads to
Denial of Service for an application. The out-of-bounds write can cause
a memory corruption which can have various consequences including
a Denial of Service or Execution of attacker-supplied code.

Although the consequences of a successful exploit of this vulnerability
could be severe, the probability that the attacker would be able to
perform it is low. Besides, password based (PWRI) encryption support in CMS
messages is very rarely used. For that reason the issue was assessed as
Moderate severity according to our Security Policy.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as the CMS implementation is outside the OpenSSL FIPS module
boundary.</Note>
    </Notes>
    <CVE>CVE-2025-9230</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:regclient-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-bash-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-fish-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-zsh-completion-0.10.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-9230.html</URL>
        <Description>CVE-2025-9230</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1250232</URL>
        <Description>SUSE Bug 1250232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1250410</URL>
        <Description>SUSE Bug 1250410</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Issue summary: A timing side-channel which could potentially allow remote
recovery of the private key exists in the SM2 algorithm implementation on 64 bit
ARM platforms.

Impact summary: A timing side-channel in SM2 signature computations on 64 bit
ARM platforms could allow recovering the private key by an attacker..

While remote key recovery over a network was not attempted by the reporter,
timing measurements revealed a timing signal which may allow such an attack.

OpenSSL does not directly support certificates with SM2 keys in TLS, and so
this CVE is not relevant in most TLS contexts.  However, given that it is
possible to add support for such certificates via a custom provider, coupled
with the fact that in such a custom provider context the private key may be
recoverable via remote timing measurements, we consider this to be a Moderate
severity issue.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as SM2 is not an approved algorithm.</Note>
    </Notes>
    <CVE>CVE-2025-9231</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:regclient-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-bash-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-fish-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-zsh-completion-0.10.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-9231.html</URL>
        <Description>CVE-2025-9231</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1250233</URL>
        <Description>SUSE Bug 1250233</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Issue summary: An application using the OpenSSL HTTP client API functions may
trigger an out-of-bounds read if the 'no_proxy' environment variable is set and
the host portion of the authority component of the HTTP URL is an IPv6 address.

Impact summary: An out-of-bounds read can trigger a crash which leads to
Denial of Service for an application.

The OpenSSL HTTP client API functions can be used directly by applications
but they are also used by the OCSP client functions and CMP (Certificate
Management Protocol) client implementation in OpenSSL. However the URLs used
by these implementations are unlikely to be controlled by an attacker.

In this vulnerable code the out of bounds read can only trigger a crash.
Furthermore the vulnerability requires an attacker-controlled URL to be
passed from an application to the OpenSSL function and the user has to have
a 'no_proxy' environment variable set. For the aforementioned reasons the
issue was assessed as Low severity.

The vulnerable code was introduced in the following patch releases:
3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as the HTTP client implementation is outside the OpenSSL FIPS module
boundary.</Note>
    </Notes>
    <CVE>CVE-2025-9232</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:regclient-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-bash-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-fish-completion-0.10.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:regclient-zsh-completion-0.10.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-9232.html</URL>
        <Description>CVE-2025-9232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1250234</URL>
        <Description>SUSE Bug 1250234</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
