Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-4575

Опубликовано: 22 мая 2025
Источник: ubuntu
Приоритет: low
CVSS3: 6.5

Описание

Issue summary: Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate. Impact summary: If a user intends to make a trusted certificate rejected for a particular use it will be instead marked as trusted for that use. A copy & paste error during minor refactoring of the code introduced this issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate should be trusted only for the purpose of authenticating TLS servers but not for CMS signature verification and the CMS signature verification is intended to be marked as rejected with the -addreject option, the resulting CA certificate will be trusted for CMS signature verification purpose instead. Only users which use the trusted certificate format who use the openssl x509 command line application to add rejected uses are affected by this issue. The issues affecting only the command line application are considered to be Low severity. The FIPS modules i...

РелизСтатусПримечание
devel

not-affected

code not present
esm-apps/bionic

not-affected

code not present
esm-apps/xenial

not-affected

code not present
esm-infra/focal

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
noble

not-affected

code not present
oracular

not-affected

code not present
plucky

not-affected

code not present
upstream

not-affected

code not present

Показывать по

РелизСтатусПримечание
devel

not-affected

uses system openssl
esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

not-affected

code not present
esm-apps/noble

not-affected

uses system openssl
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

not-affected

uses system openssl
focal

not-affected

uses system openssl
jammy

not-affected

code not present
noble

not-affected

uses system openssl

Показывать по

РелизСтатусПримечание
devel

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
fips-preview/jammy

not-affected

code not present
fips-updates/bionic

not-affected

code not present
fips-updates/focal

not-affected

code not present
fips-updates/jammy

not-affected

code not present
fips-updates/xenial

not-affected

code not present

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

not-affected

code not present
esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

plucky

DNE

upstream

not-affected

code not present

Показывать по

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
29 дней назад

Issue summary: Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate. Impact summary: If a user intends to make a trusted certificate rejected for a particular use it will be instead marked as trusted for that use. A copy & paste error during minor refactoring of the code introduced this issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate should be trusted only for the purpose of authenticating TLS servers but not for CMS signature verification and the CMS signature verification is intended to be marked as rejected with the -addreject option, the resulting CA certificate will be trusted for CMS signature verification purpose instead. Only users which use the trusted certificate format who use the openssl x509 command line application to add rejected uses are affected by this issue. The issues affecting only the command line application are considered to be Low severity. The FIPS modules in 3

CVSS3: 6.5
debian
29 дней назад

Issue summary: Use of -addreject option with the openssl x509 applicat ...

CVSS3: 6.5
github
29 дней назад

Issue summary: Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate. Impact summary: If a user intends to make a trusted certificate rejected for a particular use it will be instead marked as trusted for that use. A copy & paste error during minor refactoring of the code introduced this issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate should be trusted only for the purpose of authenticating TLS servers but not for CMS signature verification and the CMS signature verification is intended to be marked as rejected with the -addreject option, the resulting CA certificate will be trusted for CMS signature verification purpose instead. Only users which use the trusted certificate format who use the openssl x509 command line application to add rejected uses are affected by this issue. The issues affecting only the command line application are considered to be Low severity. The FIPS modules i...

CVSS3: 6.5
fstec
около 2 месяцев назад

Уязвимость функции x509_main модуля apps/x509.c библиотеки OpenSSL, позволяющая нарушителю подменить доверенный сертификат

6.5 Medium

CVSS3

Уязвимость CVE-2025-4575