File _patchinfo of Package patchinfo.38619
<patchinfo incident="38619">
<issue tracker="bnc" id="1231748">L3: FIPS - SLES15 SP6 - Stopping to enforce EMS for TLS 1.2 in FIPS mode prevents sshd and SSSD from starting</issue>
<issue tracker="bnc" id="1232326">Partner-L3: Unable to start ssh when EMS check is disabled in openssl configuration</issue>
<issue tracker="bnc" id="1230959">openssl FIPS failure with latest openssl-3 update</issue>
<issue tracker="bnc" id="1240366">VUL-0: openssl-3: Minerva side channel vulnerability in P-384</issue>
<issue tracker="bnc" id="1240607">Backport SSL object refactoring to prevent null pointer segfault [ref:_00D1igLOd._500TrWpUBJ:ref]</issue>
<issue tracker="cve" id="2025-27587"></issue>
<packager>ayankov</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for openssl-3</summary>
<description>This update for openssl-3 fixes the following issues:
Security:
- CVE-2025-27587: Timing side channel vulnerability in the P-384
implementation when used with ECDSA in the PPC architecture (bsc#1240366).
- Missing null pointer check before accessing handshake_func in ssl_lib.c (bsc#1240607).
FIPS:
- Disabling EMS in OpenSSL configuration prevents sshd from starting (bsc#1230959, bsc#1232326, bsc#1231748).
</description>
</patchinfo>