CVE-2018-0734

Name
CVE-2018-0734
Description
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://www.openssl.org/news/secadv/20181030.txt
Patch https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7
Patch https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f
Patch https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=43e6a58d4991a451daf4891ff05a48735df871ac
Third Party Advisory http://www.securityfocus.com/bid/105758
Third Party Advisory https://security.netapp.com/advisory/ntap-20181105-0002/
Third Party Advisory https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
Third Party Advisory https://www.debian.org/security/2018/dsa-4348
Third Party Advisory https://usn.ubuntu.com/3840-1/
Third Party Advisory https://www.debian.org/security/2018/dsa-4355
Third Party Advisory https://www.tenable.com/security/tns-2018-17
Third Party Advisory https://www.tenable.com/security/tns-2018-16
Patch https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Third Party Advisory https://security.netapp.com/advisory/ntap-20190118-0002/
Third Party Advisory https://security.netapp.com/advisory/ntap-20190423-0002/
Patch https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
MISC https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
REDHAT https://access.redhat.com/errata/RHSA-2019:2304
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/
REDHAT https://access.redhat.com/errata/RHSA-2019:3700
REDHAT https://access.redhat.com/errata/RHSA-2019:3935
REDHAT https://access.redhat.com/errata/RHSA-2019:3933
REDHAT https://access.redhat.com/errata/RHSA-2019:3932
MISC https://www.oracle.com/security-alerts/cpujan2020.html
N/A https://www.oracle.com/security-alerts/cpuapr2020.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:openssl:openssl:1.1.1:*:*:*:*:*:*:* openssl == None == 1.1.1
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* openssl >= 1.0.2 <= 1.0.2p
cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* openssl >= 1.1.0 <= 1.1.0i

Vulnerable and fixed packages

Source package Branch Version Maintainer Status