CVE-2018-0735

Published: 29 October 2018

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

Priority

Low

CVSS 3 base score: 5.9

Status

Package Release Status
openssl
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 20.10 (Groovy Gorilla)
Released (1.1.1a-1ubuntu2)
Ubuntu 20.04 LTS (Focal Fossa)
Released (1.1.1a-1ubuntu2)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.1.0g-2ubuntu4.3)
Ubuntu 16.04 LTS (Xenial Xerus) Not vulnerable
(1.0.2g-1ubuntu4.13)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(1.0.1f-1ubuntu2.26)
Patches:
Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4 (1.1.1)
Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=56fb454d281a023b3f950d969693553d3f3ceea1 (1.1.0)
Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=003f1bfd185267cc67ac9dc521a27d7a2af0d0ee (1.1.0)
openssl098
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 20.10 (Groovy Gorilla) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needs-triage)
openssl1.0
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 20.10 (Groovy Gorilla) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(1.0.2n-1ubuntu5.1)
Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist