CVE-2024-41996
Publication date 26 August 2024
Last updated 23 September 2024
Ubuntu priority
Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers (from the client side) to trigger unnecessarily expensive server-side DHE modular-exponentiation calculations. The client may cause asymmetric resource consumption. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE and validate the order of the public key.
Read the notes from the security team
Why is this CVE low priority?
Resource consumption issue considered a bug fix by OpenSSL developers
Status
Package | Ubuntu Release | Status |
---|---|---|
edk2 | 24.04 LTS noble |
Needs evaluation
|
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
nodejs | 24.04 LTS noble |
Not affected
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
openssl | 24.04 LTS noble |
Vulnerable
|
22.04 LTS jammy |
Vulnerable
|
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
openssl1.0 | 24.04 LTS noble | Not in release |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Not affected
|
Notes
alexmurray
Doesn't affect openssl 1.x
mdeslaur
as of 2024-09-23, has not been applied by upstream to the stable OpenSSL releases