CVE-2018-0734

Published: 30 October 2018

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).

Priority

Low

CVSS 3 base score: 5.9

Status

Package Release Status
openssl
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo)
Released (1.1.1a-1ubuntu2)
Ubuntu 20.04 LTS (Focal Fossa)
Released (1.1.1a-1ubuntu2)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.1.0g-2ubuntu4.3)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (1.0.2g-1ubuntu4.14)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1.0.1f-1ubuntu2.27)
Patches:
Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=43e6a58d4991a451daf4891ff05a48735df871ac (1.0.2)
Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=ebf65dbe1a67682d7e1f58db9c53ef737fb37f32 (1.0.2)
Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=880d1c76ed9916cddb97fe05fb4c144f0f6f1012 (1.0.2)
Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=f1b12b8713a739f27d74e6911580b2e70aea2fa4 (1.1.1)
Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f (1.1.1)
Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=6039651c43944cf4633483a74c2ef3a6b8c0c6c0 (1.1.1)
Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=84862c0979737b591acb689aef41ae2644176f32 (1.1.0)
Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7 (1.1.0)
Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=26d7fce13d469f8d1a1b42131467ed4a65f8137b (1.1.0)
openssl098
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 ESM (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needs-triage)
openssl1.0
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.0.2n-1ubuntu5.2)
Ubuntu 16.04 ESM (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Notes

AuthorNote
mdeslaur
there are other similar commits in crypto/dsa/dsa_ossl.c that
likely need backporting also.
upstream advisory was ammended with more commits

References