File _patchinfo of Package patchinfo.38619

<patchinfo incident="38619">
  <issue tracker="bnc" id="1231748">L3: FIPS - SLES15 SP6 - Stopping to enforce EMS for TLS 1.2 in FIPS mode prevents sshd and SSSD from starting</issue>
  <issue tracker="bnc" id="1232326">Partner-L3: Unable to start ssh when EMS check is disabled in openssl configuration</issue>
  <issue tracker="bnc" id="1230959">openssl FIPS failure with latest openssl-3 update</issue>
  <issue tracker="bnc" id="1240366">VUL-0: openssl-3: Minerva side channel vulnerability in P-384</issue>
  <issue tracker="bnc" id="1240607">Backport SSL object refactoring to prevent null pointer segfault [ref:_00D1igLOd._500TrWpUBJ:ref]</issue>
  <issue tracker="cve" id="2025-27587"></issue>
  <packager>ayankov</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for openssl-3</summary>
  <description>This update for openssl-3 fixes the following issues:

Security:
  
- CVE-2025-27587: Timing side channel vulnerability in the P-384
  implementation when used with ECDSA in the PPC architecture (bsc#1240366).
- Missing null pointer check before accessing handshake_func in ssl_lib.c (bsc#1240607).
  
FIPS:
    
- Disabling EMS in OpenSSL configuration prevents sshd from starting (bsc#1230959, bsc#1232326, bsc#1231748).
</description>
</patchinfo>
openSUSE Build Service is sponsored by