CVE-2018-0734
Published: 30 October 2018
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
Notes
Author | Note |
---|---|
mdeslaur | there are other similar commits in crypto/dsa/dsa_ossl.c that likely need backporting also. upstream advisory was ammended with more commits |
Priority
Status
Package | Release | Status |
---|---|---|
openssl Launchpad, Ubuntu, Debian |
bionic |
Released
(1.1.0g-2ubuntu4.3)
|
cosmic |
Released
(1.1.1-1ubuntu2.1)
|
|
disco |
Released
(1.1.1a-1ubuntu2)
|
|
eoan |
Released
(1.1.1a-1ubuntu2)
|
|
focal |
Released
(1.1.1a-1ubuntu2)
|
|
groovy |
Released
(1.1.1a-1ubuntu2)
|
|
hirsute |
Released
(1.1.1a-1ubuntu2)
|
|
trusty |
Released
(1.0.1f-1ubuntu2.27)
|
|
upstream |
Needs triage
|
|
xenial |
Released
(1.0.2g-1ubuntu4.14)
|
|
Patches: upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=43e6a58d4991a451daf4891ff05a48735df871ac upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=ebf65dbe1a67682d7e1f58db9c53ef737fb37f32 upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=880d1c76ed9916cddb97fe05fb4c144f0f6f1012 upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=f1b12b8713a739f27d74e6911580b2e70aea2fa4 upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=6039651c43944cf4633483a74c2ef3a6b8c0c6c0 upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=84862c0979737b591acb689aef41ae2644176f32 upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7 upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=26d7fce13d469f8d1a1b42131467ed4a65f8137b |
||
openssl098 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
eoan |
Does not exist
|
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
trusty |
Does not exist
(trusty was needs-triage)
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
openssl1.0 Launchpad, Ubuntu, Debian |
bionic |
Released
(1.0.2n-1ubuntu5.2)
|
cosmic |
Released
(1.0.2n-1ubuntu6.1)
|
|
disco |
Does not exist
|
|
eoan |
Does not exist
|
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.9 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |