<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for compat-openssl11 is now available for openEuler-24.03-LTS-SP1</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-1287</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-03-14</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-03-14</InitialReleaseDate>
		<CurrentReleaseDate>2025-03-14</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-03-14</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">compat-openssl11 security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for compat-openssl11 is now available for openEuler-24.03-LTS-SP1</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">OpenSSL is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols.

Security Fix(es):

Issue summary: A timing side-channel which could potentially allow recovering
the private key exists in the ECDSA signature computation.

Impact summary: A timing side-channel in ECDSA signature computations
could allow recovering the private key by an attacker. However, measuring
the timing would require either local access to the signing application or
a very fast network connection with low latency.

There is a timing signal of around 300 nanoseconds when the top word of
the inverted ECDSA nonce value is zero. This can happen with significant
probability only for some of the supported elliptic curves. In particular
the NIST P-521 curve is affected. To be able to measure this leak, the attacker
process must either be located in the same physical computer or must
have a very fast network connection with low latency. For that reason
the severity of this vulnerability is Low.(CVE-2024-13176)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for compat-openssl11 is now available for openEuler-24.03-LTS-SP1.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">compat-openssl11</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1287</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-13176</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2024-13176</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openEuler-24.03-LTS-SP1</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="compat-openssl11-debuginfo-1.1.1m-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">compat-openssl11-debuginfo-1.1.1m-13.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="compat-openssl11-debugsource-1.1.1m-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">compat-openssl11-debugsource-1.1.1m-13.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="compat-openssl11-devel-1.1.1m-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">compat-openssl11-devel-1.1.1m-13.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="compat-openssl11-libs-1.1.1m-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">compat-openssl11-libs-1.1.1m-13.oe2403sp1.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="compat-openssl11-debuginfo-1.1.1m-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">compat-openssl11-debuginfo-1.1.1m-13.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="compat-openssl11-debugsource-1.1.1m-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">compat-openssl11-debugsource-1.1.1m-13.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="compat-openssl11-devel-1.1.1m-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">compat-openssl11-devel-1.1.1m-13.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="compat-openssl11-libs-1.1.1m-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">compat-openssl11-libs-1.1.1m-13.oe2403sp1.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="compat-openssl11-1.1.1m-13" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">compat-openssl11-1.1.1m-13.oe2403sp1.src.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Issue summary: A timing side-channel which could potentially allow recovering
the private key exists in the ECDSA signature computation.

Impact summary: A timing side-channel in ECDSA signature computations
could allow recovering the private key by an attacker. However, measuring
the timing would require either local access to the signing application or
a very fast network connection with low latency.

There is a timing signal of around 300 nanoseconds when the top word of
the inverted ECDSA nonce value is zero. This can happen with significant
probability only for some of the supported elliptic curves. In particular
the NIST P-521 curve is affected. To be able to measure this leak, the attacker
process must either be located in the same physical computer or must
have a very fast network connection with low latency. For that reason
the severity of this vulnerability is Low.</Note>
		</Notes>
		<ReleaseDate>2025-03-14</ReleaseDate>
		<CVE>CVE-2024-13176</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>4.1</BaseScore>
				<Vector>AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>compat-openssl11 security update</Description>
				<DATE>2025-03-14</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1287</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>