<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for openssl-3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:20896-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-10-22T12:18:32Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-10-22T12:18:32Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-10-22T12:18:32Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for openssl-3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for openssl-3 fixes the following issues:

Security issues:

- CVE-2025-9230: Fix out-of-bounds read &amp; write in RFC 3211 KEK unwrap (bsc#1250232)

- Disable LTO for userspace livepatching [jsc#PED-13245]
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Micro-6.1-316</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520896-1/</URL>
      <Description>Link for SUSE-SU-2025:20896-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-October/023118.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:20896-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1250232</URL>
      <Description>SUSE Bug 1250232</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-9230/</URL>
      <Description>SUSE CVE CVE-2025-9230 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Micro 6.1">
      <Branch Type="Product Name" Name="SUSE Linux Micro 6.1">
        <FullProductName ProductID="SUSE Linux Micro 6.1" CPE="cpe:/o:suse:sl-micro:6.1">SUSE Linux Micro 6.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-devel-3.1.4-slfo.1.1_7.1">
      <FullProductName ProductID="libopenssl-3-devel-3.1.4-slfo.1.1_7.1">libopenssl-3-devel-3.1.4-slfo.1.1_7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl-3-fips-provider-3.1.4-slfo.1.1_7.1">
      <FullProductName ProductID="libopenssl-3-fips-provider-3.1.4-slfo.1.1_7.1">libopenssl-3-fips-provider-3.1.4-slfo.1.1_7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libopenssl3-3.1.4-slfo.1.1_7.1">
      <FullProductName ProductID="libopenssl3-3.1.4-slfo.1.1_7.1">libopenssl3-3.1.4-slfo.1.1_7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openssl-3-3.1.4-slfo.1.1_7.1">
      <FullProductName ProductID="openssl-3-3.1.4-slfo.1.1_7.1">openssl-3-3.1.4-slfo.1.1_7.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libopenssl-3-devel-3.1.4-slfo.1.1_7.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:libopenssl-3-devel-3.1.4-slfo.1.1_7.1">libopenssl-3-devel-3.1.4-slfo.1.1_7.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl-3-fips-provider-3.1.4-slfo.1.1_7.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:libopenssl-3-fips-provider-3.1.4-slfo.1.1_7.1">libopenssl-3-fips-provider-3.1.4-slfo.1.1_7.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libopenssl3-3.1.4-slfo.1.1_7.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:libopenssl3-3.1.4-slfo.1.1_7.1">libopenssl3-3.1.4-slfo.1.1_7.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="openssl-3-3.1.4-slfo.1.1_7.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Micro 6.1">
      <FullProductName ProductID="SUSE Linux Micro 6.1:openssl-3-3.1.4-slfo.1.1_7.1">openssl-3-3.1.4-slfo.1.1_7.1 as a component of SUSE Linux Micro 6.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Issue summary: An application trying to decrypt CMS messages encrypted using
password based encryption can trigger an out-of-bounds read and write.

Impact summary: This out-of-bounds read may trigger a crash which leads to
Denial of Service for an application. The out-of-bounds write can cause
a memory corruption which can have various consequences including
a Denial of Service or Execution of attacker-supplied code.

Although the consequences of a successful exploit of this vulnerability
could be severe, the probability that the attacker would be able to
perform it is low. Besides, password based (PWRI) encryption support in CMS
messages is very rarely used. For that reason the issue was assessed as
Moderate severity according to our Security Policy.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as the CMS implementation is outside the OpenSSL FIPS module
boundary.</Note>
    </Notes>
    <CVE>CVE-2025-9230</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Micro 6.1:libopenssl-3-devel-3.1.4-slfo.1.1_7.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libopenssl-3-fips-provider-3.1.4-slfo.1.1_7.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:libopenssl3-3.1.4-slfo.1.1_7.1</ProductID>
        <ProductID>SUSE Linux Micro 6.1:openssl-3-3.1.4-slfo.1.1_7.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202520896-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-9230.html</URL>
        <Description>CVE-2025-9230</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1250232</URL>
        <Description>SUSE Bug 1250232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1250410</URL>
        <Description>SUSE Bug 1250410</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
