CVE-2019-1551
Published: 06 December 2019
There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack the target would have to re-use the DH512 private key, which is not recommended anyway. Also applications directly using the low level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected 1.0.2-1.0.2t).
Priority
CVSS 3 base score: 5.3
Status
Package | Release | Status |
---|---|---|
edk2 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(code not built)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(code not built)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(code not built)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(code not built)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
nodejs Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(uses system openssl1.1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(uses system openssl1.1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(uses system openssl1.0)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(uses system openssl)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(uses system openssl)
|
|
openssl Launchpad, Ubuntu, Debian |
Upstream |
Released
(1.1.1.e)
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(1.1.1f-1ubuntu1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(1.1.1f-1ubuntu1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1.1.1-1ubuntu2.1~18.04.6)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1.0.2g-1ubuntu4.16)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
|
|
Patches: Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f (1.1) Upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=f1c5eea8a817075d31e43f5876993c6710238c98 (1.0.2) |
||
openssl1.0 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1.0.2n-1ubuntu5.4)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|