<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for openssl-3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:1516-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-05-08T13:17:46Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-05-08T13:17:46Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-05-08T13:17:46Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for openssl-3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for openssl-3 fixes the following issues:

- CVE-2024-6119: Fixed denial of service in X.509 name checks (bsc#1229465)

Other fixes:    
    
- FIPS: Deny SHA-1 signature verification in FIPS provider (bsc#1221365).
- FIPS: RSA keygen PCT requirements.
- FIPS: Check that the fips provider is available before setting
  it as the default provider in FIPS mode (bsc#1220523).
- FIPS: Port openssl to use jitterentropy (bsc#1220523).
- FIPS: Block non-Approved Elliptic Curves (bsc#1221786).
- FIPS: Service Level Indicator (bsc#1221365).
- FIPS: Output the FIPS-validation name and module version which uniquely
  identify the FIPS validated module (bsc#1221751).
- FIPS: Add required selftests: (bsc#1221760).
- FIPS: DH: Disable FIPS 186-4 Domain Parameters (bsc#1221821).
- FIPS: Recommendation for Password-Based Key Derivation (bsc#1221827).
- FIPS: Zero initialization required (bsc#1221752).
- FIPS: Reseed DRBG (bsc#1220690, bsc#1220693, bsc#1220696).
- FIPS: NIST SP 800-56Brev2 (bsc#1221824).
- FIPS: Approved Modulus Sizes for RSA Digital Signature for FIPS 186-4 (bsc#1221787).
- FIPS: Port openssl to use jitterentropy (bsc#1220523).
- FIPS: NIST SP 800-56Arev3 (bsc#1221822).
- FIPS: Error state has to be enforced (bsc#1221753).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-1516,SUSE-SLE-Module-Certifications-15-SP7-2025-1516</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251516-1/</URL>
      <Description>Link for SUSE-SU-2025:1516-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-May/039185.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:1516-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220523</URL>
      <Description>SUSE Bug 1220523</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220690</URL>
      <Description>SUSE Bug 1220690</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220693</URL>
      <Description>SUSE Bug 1220693</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1220696</URL>
      <Description>SUSE Bug 1220696</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221365</URL>
      <Description>SUSE Bug 1221365</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221751</URL>
      <Description>SUSE Bug 1221751</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221752</URL>
      <Description>SUSE Bug 1221752</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221753</URL>
      <Description>SUSE Bug 1221753</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221760</URL>
      <Description>SUSE Bug 1221760</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221786</URL>
      <Description>SUSE Bug 1221786</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221787</URL>
      <Description>SUSE Bug 1221787</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221821</URL>
      <Description>SUSE Bug 1221821</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221822</URL>
      <Description>SUSE Bug 1221822</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221824</URL>
      <Description>SUSE Bug 1221824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1221827</URL>
      <Description>SUSE Bug 1221827</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1229465</URL>
      <Description>SUSE Bug 1229465</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-6119/</URL>
      <Description>SUSE CVE CVE-2024-6119 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Certifications 15 SP7">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Certifications 15 SP7">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Certifications 15 SP7" CPE="cpe:/o:suse:sle-module-certifications:15:sp7">SUSE Linux Enterprise Module for Certifications 15 SP7</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-fips-provider-3.1.4-150600.5.15.1">
      <FullProductName ProductID="libopenssl-3-fips-provider-3.1.4-150600.5.15.1">libopenssl-3-fips-provider-3.1.4-150600.5.15.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libopenssl-3-fips-provider-3.1.4-150600.5.15.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Certifications 15 SP7">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Certifications 15 SP7:libopenssl-3-fips-provider-3.1.4-150600.5.15.1">libopenssl-3-fips-provider-3.1.4-150600.5.15.1 as a component of SUSE Linux Enterprise Module for Certifications 15 SP7</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Issue summary: Applications performing certificate name checks (e.g., TLS
clients checking server certificates) may attempt to read an invalid memory
address resulting in abnormal termination of the application process.

Impact summary: Abnormal termination of an application can a cause a denial of
service.

Applications performing certificate name checks (e.g., TLS clients checking
server certificates) may attempt to read an invalid memory address when
comparing the expected name with an `otherName` subject alternative name of an
X.509 certificate. This may result in an exception that terminates the
application program.

Note that basic certificate chain validation (signatures, dates, ...) is not
affected, the denial of service can occur only when the application also
specifies an expected DNS name, Email address or IP address.

TLS servers rarely solicit client certificates, and even when they do, they
generally don't perform a name check against a reference identifier (expected
identity), but rather extract the presented identity after checking the
certificate chain.  So TLS servers are generally not affected and the severity
of the issue is Moderate.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.</Note>
    </Notes>
    <CVE>CVE-2024-6119</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Certifications 15 SP7:libopenssl-3-fips-provider-3.1.4-150600.5.15.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251516-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-6119.html</URL>
        <Description>CVE-2024-6119</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1229465</URL>
        <Description>SUSE Bug 1229465</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
