<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for openssl is now available for openEuler-24.03-LTS</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2024-2179</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2024-09-27</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2024-09-27</InitialReleaseDate>
		<CurrentReleaseDate>2024-09-27</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2024-09-27</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">openssl security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for openssl is now available for openEuler-24.03-LTS</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, fully featured, and Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library. The project is managed by a worldwide community of volunteers that use the Internet to communicate, plan, and develop the OpenSSL tookit and its related documentation.

Security Fix(es):

Issue summary: Applications performing certificate name checks (e.g., TLS
clients checking server certificates) may attempt to read an invalid memory
address resulting in abnormal termination of the application process.

Impact summary: Abnormal termination of an application can a cause a denial of
service.

Applications performing certificate name checks (e.g., TLS clients checking
server certificates) may attempt to read an invalid memory address when
comparing the expected name with an `otherName` subject alternative name of an
X.509 certificate. This may result in an exception that terminates the
application program.

Note that basic certificate chain validation (signatures, dates, ...) is not
affected, the denial of service can occur only when the application also
specifies an expected DNS name, Email address or IP address.

TLS servers rarely solicit client certificates, and even when they do, they
generally don&apos;t perform a name check against a reference identifier (expected
identity), but rather extract the presented identity after checking the
certificate chain.  So TLS servers are generally not affected and the severity
of the issue is Moderate.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.(CVE-2024-6119)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for openssl is now available for openEuler-24.03-LTS.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">openssl</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2179</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-6119</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-6119</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="openssl-3.0.12-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssl-3.0.12-11.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssl-debuginfo-3.0.12-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssl-debuginfo-3.0.12-11.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssl-debugsource-3.0.12-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssl-debugsource-3.0.12-11.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssl-devel-3.0.12-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssl-devel-3.0.12-11.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssl-libs-3.0.12-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssl-libs-3.0.12-11.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openssl-perl-3.0.12-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssl-perl-3.0.12-11.oe2403.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="openssl-3.0.12-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssl-3.0.12-11.oe2403.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="openssl-3.0.12-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssl-3.0.12-11.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssl-debuginfo-3.0.12-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssl-debuginfo-3.0.12-11.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssl-debugsource-3.0.12-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssl-debugsource-3.0.12-11.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssl-devel-3.0.12-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssl-devel-3.0.12-11.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssl-libs-3.0.12-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssl-libs-3.0.12-11.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openssl-perl-3.0.12-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssl-perl-3.0.12-11.oe2403.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="openssl-help-3.0.12-11" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openssl-help-3.0.12-11.oe2403.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Issue summary: Applications performing certificate name checks (e.g., TLSclients checking server certificates) may attempt to read an invalid memoryaddress resulting in abnormal termination of the application process.Impact summary: Abnormal termination of an application can a cause a denial ofservice.Applications performing certificate name checks (e.g., TLS clients checkingserver certificates) may attempt to read an invalid memory address whencomparing the expected name with an `otherName` subject alternative name of anX.509 certificate. This may result in an exception that terminates theapplication program.Note that basic certificate chain validation (signatures, dates, ...) is notaffected, the denial of service can occur only when the application alsospecifies an expected DNS name, Email address or IP address.TLS servers rarely solicit client certificates, and even when they do, theygenerally don t perform a name check against a reference identifier (expectedidentity), but rather extract the presented identity after checking thecertificate chain.  So TLS servers are generally not affected and the severityof the issue is Moderate.The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.</Note>
		</Notes>
		<ReleaseDate>2024-09-27</ReleaseDate>
		<CVE>CVE-2024-6119</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>openssl security update</Description>
				<DATE>2024-09-27</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2179</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>