CVE-2018-0737
16.04.2018, 18:29
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).Enginsight
| Vendor | Product | Version |
|---|---|---|
| openssl | openssl | 1.0.2b ≤ 𝑥 ≤ 1.0.2o |
| openssl | openssl | 1.1.0 ≤ 𝑥 ≤ 1.1.0h |
| canonical | ubuntu_linux | 14.04 |
| canonical | ubuntu_linux | 16.04 |
| canonical | ubuntu_linux | 17.10 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| openssl |
| ||||||||||||
| openssl098 |
| ||||||||||||
| openssl1.0 |
|
Common Weakness Enumeration
References