CVE-2024-13454

NameCVE-2024-13454
DescriptionWeak encryption algorithm in Easy-RSA version 3.0.5 through 3.1.7 allows a local attacker to more easily bruteforce the private CA key when created using OpenSSL 3
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
easy-rsa (PTS)bullseye3.0.8-1fixed
bookworm3.1.0-1vulnerable
sid, trixie3.2.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
easy-rsasourcebullseye(not affected)
easy-rsasource(unstable)3.2.0-1

Notes

[bookworm] - easy-rsa <no-dsa> (Minor issue)
[bullseye] - easy-rsa <not-affected> (Support for OpenSSL 3 was introduced in 3.1.0)
https://community.openvpn.net/openvpn/wiki/CVE-2024-13454

Search for package or bug name: Reporting problems