Описание
Security update for openssl-3
This update for openssl-3 fixes the following issues:
- CVE-2025-9230: Fixed out-of-bounds read & write in RFC 3211 KEK unwrap (bsc#1250232).
Список пакетов
Container bci/bci-init:latest
Container bci/bci-micro-fips:latest
Container bci/bci-sle15-kernel-module-devel:latest
Container bci/gcc:latest
Container bci/golang:1.24-openssl
Container bci/golang:latest
Container bci/kiwi:latest
Container bci/nodejs:latest
Container bci/openjdk-devel:17
Container bci/openjdk-devel:latest
Container bci/openjdk:17
Container bci/openjdk:latest
Container bci/php-apache:latest
Container bci/php-fpm:latest
Container bci/php:latest
Container bci/python:3
Container bci/python:latest
Container bci/ruby:2
Container bci/ruby:latest
Container bci/rust:latest
Container bci/spack:latest
Container suse/389-ds:latest
Container suse/bind:latest
Container suse/git:latest
Container suse/helm:latest
Container suse/kea:latest
Container suse/kiosk/firefox-esr:latest
Container suse/kiosk/pulseaudio:latest
Container suse/kiosk/xorg-client:latest
Container suse/kiosk/xorg:latest
Container suse/mariadb-client:latest
Container suse/mariadb:latest
Container suse/nginx:latest
Container suse/pcp:latest
Container suse/postgres:16
Container suse/postgres:latest
Container suse/rmt-server:latest
Container suse/samba-client:latest
Container suse/samba-server:latest
Container suse/samba-toolbox:latest
Container suse/sle15:latest
Container suse/stunnel:latest
Container suse/valkey:latest
SUSE Linux Enterprise Module for Basesystem 15 SP7
Ссылки
- Link for SUSE-SU-2025:03546-1
- E-Mail link for SUSE-SU-2025:03546-1
- SUSE Security Ratings
- SUSE Bug 1250232
- SUSE CVE CVE-2025-9230 page
Описание
Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.
Затронутые продукты
Ссылки
- CVE-2025-9230
- SUSE Bug 1250232
- SUSE Bug 1250410