Hello Matthew,

Thank you for your specific questions. I have run the checks on the
affected system, and here are the results:

1. Is the system in FIPS mode?

No. The output of sudo pro status confirms FIPS is not active on this
system.

sudo pro status --all
SERVICE          AVAILABLE  DESCRIPTION
anbox-cloud      yes        Scalable Android in the cloud
cc-eal           no         Common Criteria EAL2 Provisioning Packages
esm-apps         yes        Expanded Security Maintenance for Applications
esm-apps-legacy  no         Expanded Security Maintenance for Applications on 
Legacy Instances
esm-infra        yes        Expanded Security Maintenance for Infrastructure
esm-infra-legacy no         Expanded Security Maintenance for Infrastructure on 
Legacy Instances
fips             no         NIST-certified FIPS crypto packages
fips-preview     no         Preview of FIPS crypto packages undergoing 
certification with NIST
fips-updates     yes        FIPS compliant crypto packages with stable security 
updates
landscape        yes        Management and administration tool for Ubuntu
livepatch        yes        Canonical Livepatch service
realtime-kernel  yes        Ubuntu kernel with PREEMPT_RT patches integrated
ros              no         Security Updates for the Robot Operating System
ros-updates      no         All Updates for the Robot Operating System
usg              yes        Security compliance and audit tools

2. Are we running the latest OpenSSL package (3.0.13-0ubuntu3.7)?

Yes. The output of apt-cache policy openssl confirms we are already on
the latest version available in the noble-security and noble-updates
repositories.

apt-cache policy openssl
openssl:
  Installed: 3.0.13-0ubuntu3.7
  Candidate: 3.0.13-0ubuntu3.7
  Version table:
 *** 3.0.13-0ubuntu3.7 500
        500 http://eu-central-1.ec2.archive.ubuntu.com/ubuntu 
noble-updates/main amd64 Packages
        500 http://security.ubuntu.com/ubuntu noble-security/main amd64 Packages
        100 /var/lib/dpkg/status
     3.0.13-0ubuntu3 500
        500 http://eu-central-1.ec2.archive.ubuntu.com/ubuntu noble/main amd64 
Packages

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2146760

Title:
  Severe performance regression in OpenSSL 3.0.13 causes ~300ms TLS
  handshake latency on Ubuntu 24.04 LTS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/2146760/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to