CVE-2018-0737
16.04.2018, 18:29
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).Enginsight
Vendor | Product | Version |
---|---|---|
openssl | openssl | 1.0.2b ≤ 𝑥 ≤ 1.0.2o |
openssl | openssl | 1.1.0 ≤ 𝑥 ≤ 1.1.0h |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 17.10 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
openssl |
| ||||||||||||
openssl098 |
| ||||||||||||
openssl1.0 |
|
Common Weakness Enumeration
References