CVE-2025-4575

Publication date 22 May 2025

Last updated 30 May 2025


Ubuntu priority

Cvss 3 Severity Score

6.5 · Medium

Score breakdown

Issue summary: Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate. Impact summary: If a user intends to make a trusted certificate rejected for a particular use it will be instead marked as trusted for that use. A copy & paste error during minor refactoring of the code introduced this issue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate should be trusted only for the purpose of authenticating TLS servers but not for CMS signature verification and the CMS signature verification is intended to be marked as rejected with the -addreject option, the resulting CA certificate will be trusted for CMS signature verification purpose instead. Only users which use the trusted certificate format who use the openssl x509 command line application to add rejected uses are affected by this issue. The issues affecting only the command line application are considered to be Low severity. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this issue.

Read the notes from the security team

Why is this CVE low priority?

Per OpenSSL developer, this is a low severity issue

Learn more about Ubuntu priority

Status

Package Ubuntu Release Status
edk2 25.04 plucky
Not affected
24.10 oracular
Not affected
24.04 LTS noble
Not affected
22.04 LTS jammy
Not affected
20.04 LTS focal
Not affected
18.04 LTS bionic
Not affected
16.04 LTS xenial
Not affected
nodejs 25.04 plucky
Not affected
24.10 oracular
Not affected
24.04 LTS noble
Not affected
22.04 LTS jammy
Not affected
20.04 LTS focal
Not affected
18.04 LTS bionic
Not affected
16.04 LTS xenial
Not affected
14.04 LTS trusty
Not affected
openssl 25.04 plucky
Not affected
24.10 oracular
Not affected
24.04 LTS noble
Not affected
22.04 LTS jammy  
Not affected
20.04 LTS focal  
Not affected
18.04 LTS bionic  
Not affected
16.04 LTS xenial  
Not affected
14.04 LTS trusty
Not affected
openssl1.0 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic
Not affected

Notes


mdeslaur

Due to this issue being low severity, the upstream OpenSSL developers have not released new versions of OpenSSL with the fix Ony affects OpenSSL 3.5.0

Severity score breakdown

Parameter Value
Base score 6.5 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact Low
Availability impact Low
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L