CVE-2018-0735
Published: 29 October 2018
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).
Priority
CVSS 3 base score: 5.9
Status
Package | Release | Status |
---|---|---|
openssl Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(1.1.1a-1ubuntu2)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(1.1.1a-1ubuntu2)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1.1.0g-2ubuntu4.3)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(1.0.2g-1ubuntu4.13)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(1.0.1f-1ubuntu2.26)
|
|
Patches: Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4 (1.1.1) Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=56fb454d281a023b3f950d969693553d3f3ceea1 (1.1.0) Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=003f1bfd185267cc67ac9dc521a27d7a2af0d0ee (1.1.0) |
||
openssl098 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was needs-triage)
|
|
openssl1.0 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(1.0.2n-1ubuntu5.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|