{"id":"ALPINE-CVE-2025-4575","details":"Issue summary: Use of -addreject option with the openssl x509 application adds\na trusted use instead of a rejected use for a certificate.\n\nImpact summary: If a user intends to make a trusted certificate rejected for\na particular use it will be instead marked as trusted for that use.\n\nA copy & paste error during minor refactoring of the code introduced this\nissue in the OpenSSL 3.5 version. If, for example, a trusted CA certificate\nshould be trusted only for the purpose of authenticating TLS servers but not\nfor CMS signature verification and the CMS signature verification is intended\nto be marked as rejected with the -addreject option, the resulting CA\ncertificate will be trusted for CMS signature verification purpose instead.\n\nOnly users which use the trusted certificate format who use the openssl x509\ncommand line application to add rejected uses are affected by this issue.\nThe issues affecting only the command line application are considered to\nbe Low severity.\n\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue.\n\nOpenSSL 3.4, 3.3, 3.2, 3.1, 3.0, 1.1.1 and 1.0.2 are also not affected by this\nissue.","modified":"2026-03-09T01:24:01.281598Z","published":"2025-05-22T14:16:07.630Z","upstream":["CVE-2025-4575"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2025-4575"}],"affected":[{"package":{"name":"openssl","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.5.1-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.1-r0","3.0.1-r1","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.5-r2","3.0.5-r3","3.0.6-r0","3.0.7-r0","3.0.7-r1","3.0.7-r2","3.0.8-r0","3.0.8-r1","3.1.0-r0","3.1.0-r1","3.1.0-r2","3.1.0-r3","3.1.0-r4","3.1.0-r5","3.1.1-r0","3.1.1-r1","3.1.1-r2","3.1.1-r3","3.1.2-r0","3.1.3-r0","3.1.4-r0","3.1.4-r1","3.1.4-r2","3.1.4-r3","3.1.4-r4","3.1.4-r5","3.1.5-r5","3.2.1-r0","3.2.1-r1","3.2.1-r2","3.3.0-r0","3.3.0-r1","3.3.0-r2","3.3.0-r3","3.3.1-r0","3.3.1-r1","3.3.1-r2","3.3.1-r3","3.3.2-r0","3.3.2-r1","3.3.2-r2","3.3.2-r3","3.3.2-r4","3.3.2-r5","3.3.2-r6","3.3.3-r0","3.5.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2025-4575.json"}},{"package":{"name":"openssl","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/openssl?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.5.1-r0"}]}],"versions":["1.1.1-r0","1.1.1-r1","1.1.1-r2","1.1.1-r3","1.1.1-r4","1.1.1-r5","1.1.1a-r0","1.1.1a-r1","1.1.1b-r0","1.1.1b-r1","1.1.1c-r0","1.1.1c-r1","1.1.1d-r1","1.1.1d-r2","1.1.1d-r3","1.1.1d-r4","1.1.1d-r5","1.1.1e-r0","1.1.1f-r0","1.1.1g-r0","1.1.1h-r0","1.1.1i-r0","1.1.1j-r0","1.1.1k-r0","1.1.1k-r1","1.1.1l-r0","3.0.0-r0","3.0.0-r1","3.0.0-r2","3.0.0-r3","3.0.0-r4","3.0.1-r0","3.0.1-r1","3.0.2-r0","3.0.3-r0","3.0.5-r0","3.0.5-r1","3.0.5-r2","3.0.5-r3","3.0.6-r0","3.0.7-r0","3.0.7-r1","3.0.7-r2","3.0.8-r0","3.0.8-r1","3.1.0-r0","3.1.0-r1","3.1.0-r2","3.1.0-r3","3.1.0-r4","3.1.0-r5","3.1.1-r0","3.1.1-r1","3.1.1-r2","3.1.1-r3","3.1.2-r0","3.1.3-r0","3.1.4-r0","3.1.4-r1","3.1.4-r2","3.1.4-r3","3.1.4-r4","3.1.4-r5","3.1.5-r5","3.2.1-r0","3.2.1-r1","3.2.1-r2","3.3.0-r0","3.3.0-r1","3.3.0-r2","3.3.0-r3","3.3.1-r0","3.3.1-r1","3.3.1-r2","3.3.1-r3","3.3.2-r0","3.3.2-r1","3.3.2-r2","3.3.2-r3","3.3.2-r4","3.3.2-r5","3.3.2-r6","3.3.3-r0","3.5.0-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2025-4575.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}]}