{
  "document": {
    "aggregate_severity": {
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2019-1547: fix side-channel vulnerability in ECDSA when using explicit\n  EC parameters without cofactor\n- CVE-2025-9230: fix incorrect check of unwrapped key size",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/cloudlinux7els/advisories/2025/clsa-2025_1760028485.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1760028485",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1760028485"
      }
    ],
    "tracking": {
      "current_release_date": "2025-10-24T17:18:23Z",
      "generator": {
        "date": "2025-10-24T17:18:23Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1760028485",
      "initial_release_date": "2025-10-09T16:48:14Z",
      "revision_history": [
        {
          "date": "2025-10-09T16:48:14Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-10-24T17:18:23Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "openssl: Fix of 2 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "CloudLinux 7",
                "product": {
                  "name": "CloudLinux 7",
                  "product_id": "CloudLinux-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:cloudlinux:cloudlinux:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "CloudLinux"
          }
        ],
        "category": "vendor",
        "name": "Cloud Linux Software, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                "product": {
                  "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                  "product_id": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/openssl-libs@1.0.2k-26.el7_9.tuxcare.els6?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                "product": {
                  "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                  "product_id": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/openssl-devel@1.0.2k-26.el7_9.tuxcare.els6?arch=i686&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                "product": {
                  "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                  "product_id": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/openssl-static@1.0.2k-26.el7_9.tuxcare.els6?arch=i686&epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                "product": {
                  "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_id": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/openssl-libs@1.0.2k-26.el7_9.tuxcare.els6?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                "product": {
                  "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_id": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/openssl-devel@1.0.2k-26.el7_9.tuxcare.els6?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                "product": {
                  "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_id": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/openssl-perl@1.0.2k-26.el7_9.tuxcare.els6?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                "product": {
                  "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_id": "openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/openssl@1.0.2k-26.el7_9.tuxcare.els6?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                "product": {
                  "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_id": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/cloudlinux/openssl-static@1.0.2k-26.el7_9.tuxcare.els6?arch=x86_64&epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686 as a component of CloudLinux 7",
          "product_id": "CloudLinux-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686"
        },
        "product_reference": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
        "relates_to_product_reference": "CloudLinux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64 as a component of CloudLinux 7",
          "product_id": "CloudLinux-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
        },
        "product_reference": "openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
        "relates_to_product_reference": "CloudLinux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686 as a component of CloudLinux 7",
          "product_id": "CloudLinux-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686"
        },
        "product_reference": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
        "relates_to_product_reference": "CloudLinux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64 as a component of CloudLinux 7",
          "product_id": "CloudLinux-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
        },
        "product_reference": "openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
        "relates_to_product_reference": "CloudLinux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64 as a component of CloudLinux 7",
          "product_id": "CloudLinux-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
        },
        "product_reference": "openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
        "relates_to_product_reference": "CloudLinux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64 as a component of CloudLinux 7",
          "product_id": "CloudLinux-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
        },
        "product_reference": "openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
        "relates_to_product_reference": "CloudLinux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686 as a component of CloudLinux 7",
          "product_id": "CloudLinux-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686"
        },
        "product_reference": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
        "relates_to_product_reference": "CloudLinux-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64 as a component of CloudLinux 7",
          "product_id": "CloudLinux-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
        },
        "product_reference": "openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
        "relates_to_product_reference": "CloudLinux-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-1547",
      "notes": [
        {
          "category": "description",
          "text": "Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CloudLinux-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
          "CloudLinux-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
          "CloudLinux-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
          "CloudLinux-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
          "CloudLinux-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
          "CloudLinux-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
          "CloudLinux-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
          "CloudLinux-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2019-1547"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html",
          "url": "http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html"
        },
        {
          "category": "external",
          "summary": "https://arxiv.org/abs/1909.01785",
          "url": "https://arxiv.org/abs/1909.01785"
        },
        {
          "category": "external",
          "summary": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=21c856b75d81eff61aa63b4f036bb64a85bf6d46",
          "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=21c856b75d81eff61aa63b4f036bb64a85bf6d46"
        },
        {
          "category": "external",
          "summary": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30c22fa8b1d840036b8e203585738df62a03cec8",
          "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30c22fa8b1d840036b8e203585738df62a03cec8"
        },
        {
          "category": "external",
          "summary": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a",
          "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a"
        },
        {
          "category": "external",
          "summary": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365",
          "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html",
          "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/bugtraq/2019/Oct/0",
          "url": "https://seclists.org/bugtraq/2019/Oct/0"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/bugtraq/2019/Oct/1",
          "url": "https://seclists.org/bugtraq/2019/Oct/1"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/bugtraq/2019/Sep/25",
          "url": "https://seclists.org/bugtraq/2019/Sep/25"
        },
        {
          "category": "external",
          "summary": "https://security.gentoo.org/glsa/201911-04",
          "url": "https://security.gentoo.org/glsa/201911-04"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20190919-0002/",
          "url": "https://security.netapp.com/advisory/ntap-20190919-0002/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20200122-0002/",
          "url": "https://security.netapp.com/advisory/ntap-20200122-0002/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20200416-0003/",
          "url": "https://security.netapp.com/advisory/ntap-20200416-0003/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20240621-0006/",
          "url": "https://security.netapp.com/advisory/ntap-20240621-0006/"
        },
        {
          "category": "external",
          "summary": "https://support.f5.com/csp/article/K73422160?utm_source=f5support&amp%3Butm_medium=RSS",
          "url": "https://support.f5.com/csp/article/K73422160?utm_source=f5support&amp%3Butm_medium=RSS"
        },
        {
          "category": "external",
          "summary": "https://usn.ubuntu.com/4376-1/",
          "url": "https://usn.ubuntu.com/4376-1/"
        },
        {
          "category": "external",
          "summary": "https://usn.ubuntu.com/4376-2/",
          "url": "https://usn.ubuntu.com/4376-2/"
        },
        {
          "category": "external",
          "summary": "https://usn.ubuntu.com/4504-1/",
          "url": "https://usn.ubuntu.com/4504-1/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2019/dsa-4539",
          "url": "https://www.debian.org/security/2019/dsa-4539"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2019/dsa-4540",
          "url": "https://www.debian.org/security/2019/dsa-4540"
        },
        {
          "category": "external",
          "summary": "https://www.openssl.org/news/secadv/20190910.txt",
          "url": "https://www.openssl.org/news/secadv/20190910.txt"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuapr2020.html",
          "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2020.html",
          "url": "https://www.oracle.com/security-alerts/cpujan2020.html"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujul2020.html",
          "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2020.html",
          "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
          "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
        },
        {
          "category": "external",
          "summary": "https://www.tenable.com/security/tns-2019-08",
          "url": "https://www.tenable.com/security/tns-2019-08"
        },
        {
          "category": "external",
          "summary": "https://www.tenable.com/security/tns-2019-09",
          "url": "https://www.tenable.com/security/tns-2019-09"
        }
      ],
      "release_date": "2019-09-10T17:15:00Z",
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "baseSeverity": "LOW",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CloudLinux-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
            "CloudLinux-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
            "CloudLinux-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
            "CloudLinux-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
            "CloudLinux-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
            "CloudLinux-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
            "CloudLinux-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
            "CloudLinux-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-9230",
      "notes": [
        {
          "category": "description",
          "text": "Issue summary: An application trying to decrypt CMS messages encrypted using\npassword based encryption can trigger an out-of-bounds read and write.\nImpact summary: This out-of-bounds read may trigger a crash which leads to\nDenial of Service for an application. The out-of-bounds write can cause\na memory corruption which can have various consequences including\na Denial of Service or Execution of attacker-supplied code.\nAlthough the consequences of a successful exploit of this vulnerability\ncould be severe, the probability that the attacker would be able to\nperform it is low. Besides, password based (PWRI) encryption support in CMS\nmessages is very rarely used. For that reason the issue was assessed as\nModerate severity according to our Security Policy.\nThe FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this\nissue, as the CMS implementation is outside the OpenSSL FIPS module\nboundary.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CloudLinux-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
          "CloudLinux-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
          "CloudLinux-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
          "CloudLinux-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
          "CloudLinux-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
          "CloudLinux-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
          "CloudLinux-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
          "CloudLinux-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-9230"
        }
      ],
      "release_date": "2025-09-30T23:59:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CloudLinux-7:openssl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
            "CloudLinux-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
            "CloudLinux-7:openssl-devel-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
            "CloudLinux-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
            "CloudLinux-7:openssl-libs-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
            "CloudLinux-7:openssl-perl-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64",
            "CloudLinux-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.i686",
            "CloudLinux-7:openssl-static-1:1.0.2k-26.el7_9.tuxcare.els6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}