CVE-2018-0734
Published: 30 October 2018
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
Priority
CVSS 3 base score: 5.9
Status
Package | Release | Status |
---|---|---|
openssl Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(1.1.1a-1ubuntu2)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(1.1.1a-1ubuntu2)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1.1.0g-2ubuntu4.3)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1.0.2g-1ubuntu4.14)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(1.0.1f-1ubuntu2.27)
|
|
Patches: Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=43e6a58d4991a451daf4891ff05a48735df871ac (1.0.2) Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=ebf65dbe1a67682d7e1f58db9c53ef737fb37f32 (1.0.2) Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=880d1c76ed9916cddb97fe05fb4c144f0f6f1012 (1.0.2) Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=f1b12b8713a739f27d74e6911580b2e70aea2fa4 (1.1.1) Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f (1.1.1) Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=6039651c43944cf4633483a74c2ef3a6b8c0c6c0 (1.1.1) Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=84862c0979737b591acb689aef41ae2644176f32 (1.1.0) Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7 (1.1.0) Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=26d7fce13d469f8d1a1b42131467ed4a65f8137b (1.1.0) |
||
openssl098 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was needs-triage)
|
|
openssl1.0 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1.0.2n-1ubuntu5.2)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
Notes
Author | Note |
---|---|
mdeslaur | there are other similar commits in crypto/dsa/dsa_ossl.c that likely need backporting also. upstream advisory was ammended with more commits |