<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libopenssl-3-devel-3.5.0-3.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:16245</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-05-30T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-05-30T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-05-30T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libopenssl-3-devel-3.5.0-3.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libopenssl-3-devel-3.5.0-3.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-16245</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-27587/</URL>
      <Description>SUSE CVE CVE-2025-27587 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-4575/</URL>
      <Description>SUSE CVE CVE-2025-4575 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-devel-3.5.0-3.1">
      <FullProductName ProductID="libopenssl-3-devel-3.5.0-3.1">libopenssl-3-devel-3.5.0-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-devel-32bit-3.5.0-3.1">
      <FullProductName ProductID="libopenssl-3-devel-32bit-3.5.0-3.1">libopenssl-3-devel-32bit-3.5.0-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-fips-provider-3.5.0-3.1">
      <FullProductName ProductID="libopenssl-3-fips-provider-3.5.0-3.1">libopenssl-3-fips-provider-3.5.0-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-fips-provider-32bit-3.5.0-3.1">
      <FullProductName ProductID="libopenssl-3-fips-provider-32bit-3.5.0-3.1">libopenssl-3-fips-provider-32bit-3.5.0-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-fips-provider-x86-64-v3-3.5.0-3.1">
      <FullProductName ProductID="libopenssl-3-fips-provider-x86-64-v3-3.5.0-3.1">libopenssl-3-fips-provider-x86-64-v3-3.5.0-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl3-3.5.0-3.1">
      <FullProductName ProductID="libopenssl3-3.5.0-3.1">libopenssl3-3.5.0-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl3-32bit-3.5.0-3.1">
      <FullProductName ProductID="libopenssl3-32bit-3.5.0-3.1">libopenssl3-32bit-3.5.0-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl3-x86-64-v3-3.5.0-3.1">
      <FullProductName ProductID="libopenssl3-x86-64-v3-3.5.0-3.1">libopenssl3-x86-64-v3-3.5.0-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-3-3.5.0-3.1">
      <FullProductName ProductID="openssl-3-3.5.0-3.1">openssl-3-3.5.0-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-3-doc-3.5.0-3.1">
      <FullProductName ProductID="openssl-3-doc-3.5.0-3.1">openssl-3-doc-3.5.0-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libopenssl-3-devel-3.5.0-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl-3-devel-3.5.0-3.1">libopenssl-3-devel-3.5.0-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-3-devel-32bit-3.5.0-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.5.0-3.1">libopenssl-3-devel-32bit-3.5.0-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-3-fips-provider-3.5.0-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl-3-fips-provider-3.5.0-3.1">libopenssl-3-fips-provider-3.5.0-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-3-fips-provider-32bit-3.5.0-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.5.0-3.1">libopenssl-3-fips-provider-32bit-3.5.0-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-3-fips-provider-x86-64-v3-3.5.0-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.5.0-3.1">libopenssl-3-fips-provider-x86-64-v3-3.5.0-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl3-3.5.0-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl3-3.5.0-3.1">libopenssl3-3.5.0-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl3-32bit-3.5.0-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl3-32bit-3.5.0-3.1">libopenssl3-32bit-3.5.0-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl3-x86-64-v3-3.5.0-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.5.0-3.1">libopenssl3-x86-64-v3-3.5.0-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-3-3.5.0-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openssl-3-3.5.0-3.1">openssl-3-3.5.0-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-3-doc-3.5.0-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openssl-3-doc-3.5.0-3.1">openssl-3-doc-3.5.0-3.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the K value (nonce) from the signatures. Next, based on the bit size of the extracted nonce, one can compare the signing time of full-sized nonces to signatures that used smaller nonces, via statistical tests. There is a side-channel in the P-364 curve that allows private key extraction (also, there is a dependency between the bit size of K and the size of the side channel). NOTE: This CVE is disputed because the OpenSSL security policy explicitly notes that any side channels which require same physical system to be detected are outside of the threat model for the software. The timing signal is so small that it is infeasible to be detected without having the attacking process running on the same physical system.</Note>
    </Notes>
    <CVE>CVE-2025-27587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-3-devel-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-fips-provider-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl3-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl3-32bit-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-3-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-3-doc-3.5.0-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-27587.html</URL>
        <Description>CVE-2025-27587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240366</URL>
        <Description>SUSE Bug 1240366</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Issue summary: Use of -addreject option with the openssl x509 application adds
a trusted use instead of a rejected use for a certificate.

Impact summary: If a user intends to make a trusted certificate rejected for
a particular use it will be instead marked as trusted for that use.

A copy &amp; paste error during minor refactoring of the code introduced this
issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate
should be trusted only for the purpose of authenticating TLS servers but not
for CMS signature verification and the CMS signature verification is intended
to be marked as rejected with the -addreject option, the resulting CA
certificate will be trusted for CMS signature verification purpose instead.

Only users which use the trusted certificate format who use the openssl x509
command line application to add rejected uses are affected by this issue.
The issues affecting only the command line application are considered to
be Low severity.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue.

OpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this
issue.</Note>
    </Notes>
    <CVE>CVE-2025-4575</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libopenssl-3-devel-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-devel-32bit-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-fips-provider-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-fips-provider-32bit-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl-3-fips-provider-x86-64-v3-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl3-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl3-32bit-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libopenssl3-x86-64-v3-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-3-3.5.0-3.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openssl-3-doc-3.5.0-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-4575.html</URL>
        <Description>CVE-2025-4575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243564</URL>
        <Description>SUSE Bug 1243564</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
