CVE-2025-4575 - log back

CVE-2025-4575 edited at 22 May 2025 18:44:59
Description
+ Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate.
- Use of -addreject option with the openssl x509 application adds
- a trusted use instead of a rejected use for a certificate.
+ If a user intends to make a trusted certificate rejected for a particular use it will be instead marked as trusted for that use.
- If a user intends to make a trusted certificate rejected for
- a particular use it will be instead marked as trusted for that use.
+ If, for example, a trusted CA certificate should be trusted only for the purpose of authenticating TLS servers but not for CMS signature verification and the CMS signature verification is intended to be marked as rejected with the -addreject option, the resulting CA certificate will be trusted for CMS signature verification purpose instead.
- If, for example, a trusted CA certificate
- should be trusted only for the purpose of authenticating TLS servers but not
- for CMS signature verification and the CMS signature verification is intended
- to be marked as rejected with the -addreject option, the resulting CA
- certificate will be trusted for CMS signature verification purpose instead.
+ Only users which use the trusted certificate format who use the openssl x509 command line application to add rejected uses are affected by this issue.
- Only users which use the trusted certificate format who use the openssl x509
- command line application to add rejected uses are affected by this issue.
CVE-2025-4575 edited at 22 May 2025 18:43:46
Description
Use of -addreject option with the openssl x509 application adds
a trusted use instead of a rejected use for a certificate.
If a user intends to make a trusted certificate rejected for
a particular use it will be instead marked as trusted for that use.
+ If, for example, a trusted CA certificate
- A copy & paste error during minor refactoring of the code introduced this
- issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate
should be trusted only for the purpose of authenticating TLS servers but not
for CMS signature verification and the CMS signature verification is intended
to be marked as rejected with the -addreject option, the resulting CA
certificate will be trusted for CMS signature verification purpose instead.
Only users which use the trusted certificate format who use the openssl x509
command line application to add rejected uses are affected by this issue.
CVE-2025-4575 edited at 22 May 2025 18:42:41
Description
Use of -addreject option with the openssl x509 application adds
a trusted use instead of a rejected use for a certificate.
If a user intends to make a trusted certificate rejected for
a particular use it will be instead marked as trusted for that use.
A copy & paste error during minor refactoring of the code introduced this
issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate
should be trusted only for the purpose of authenticating TLS servers but not
for CMS signature verification and the CMS signature verification is intended
to be marked as rejected with the -addreject option, the resulting CA
certificate will be trusted for CMS signature verification purpose instead.
Only users which use the trusted certificate format who use the openssl x509
command line application to add rejected uses are affected by this issue.
- The issues affecting only the command line application are considered to
- be Low severity.
CVE-2025-4575 created at 22 May 2025 18:41:54
Severity
+ Low
Remote
+ Local
Type
+ Certificate verification bypass
Description
+ Use of -addreject option with the openssl x509 application adds
+ a trusted use instead of a rejected use for a certificate.
+
+ If a user intends to make a trusted certificate rejected for
+ a particular use it will be instead marked as trusted for that use.
+
+ A copy & paste error during minor refactoring of the code introduced this
+ issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate
+ should be trusted only for the purpose of authenticating TLS servers but not
+ for CMS signature verification and the CMS signature verification is intended
+ to be marked as rejected with the -addreject option, the resulting CA
+ certificate will be trusted for CMS signature verification purpose instead.
+
+ Only users which use the trusted certificate format who use the openssl x509
+ command line application to add rejected uses are affected by this issue.
+ The issues affecting only the command line application are considered to
+ be Low severity.
References
+ https://openssl-library.org/news/secadv/20250522.txt
Notes