Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2018-0734

Published: 30 October 2018

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).

Notes

AuthorNote
mdeslaur
there are other similar commits in crypto/dsa/dsa_ossl.c that
likely need backporting also.
upstream advisory was ammended with more commits

Priority

Low

Cvss 3 Severity Score

5.9

Score breakdown

Status

Package Release Status
openssl
Launchpad, Ubuntu, Debian
bionic
Released (1.1.0g-2ubuntu4.3)
cosmic
Released (1.1.1-1ubuntu2.1)
disco
Released (1.1.1a-1ubuntu2)
eoan
Released (1.1.1a-1ubuntu2)
focal
Released (1.1.1a-1ubuntu2)
groovy
Released (1.1.1a-1ubuntu2)
hirsute
Released (1.1.1a-1ubuntu2)
trusty
Released (1.0.1f-1ubuntu2.27)
upstream Needs triage

xenial
Released (1.0.2g-1ubuntu4.14)
Patches:
upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=43e6a58d4991a451daf4891ff05a48735df871ac
upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=ebf65dbe1a67682d7e1f58db9c53ef737fb37f32
upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=880d1c76ed9916cddb97fe05fb4c144f0f6f1012
upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=f1b12b8713a739f27d74e6911580b2e70aea2fa4
upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f
upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=6039651c43944cf4633483a74c2ef3a6b8c0c6c0
upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=84862c0979737b591acb689aef41ae2644176f32
upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7
upstream: https://git.openssl.org/?p=openssl.git;a=commit;h=26d7fce13d469f8d1a1b42131467ed4a65f8137b
openssl098
Launchpad, Ubuntu, Debian
bionic Does not exist

cosmic Does not exist

disco Does not exist

eoan Does not exist

focal Does not exist

groovy Does not exist

hirsute Does not exist

trusty Does not exist
(trusty was needs-triage)
upstream Needs triage

xenial Does not exist

openssl1.0
Launchpad, Ubuntu, Debian
bionic
Released (1.0.2n-1ubuntu5.2)
cosmic
Released (1.0.2n-1ubuntu6.1)
disco Does not exist

eoan Does not exist

focal Does not exist

groovy Does not exist

hirsute Does not exist

trusty Does not exist

upstream Needs triage

xenial Does not exist

Severity score breakdown

Parameter Value
Base score 5.9
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N