CVE-2018-0737

Publication date 16 April 2018

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

5.9 · Medium

Score breakdown

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

Read the notes from the security team

Status

Package Ubuntu Release Status
openssl 19.04 disco
Fixed 1.1.0g-2ubuntu5
18.10 cosmic
Fixed 1.1.0g-2ubuntu5
18.04 LTS bionic
Fixed 1.1.0g-2ubuntu4.1
17.10 artful
Fixed 1.0.2g-1ubuntu13.6
16.04 LTS xenial
Fixed 1.0.2g-1ubuntu4.13
14.04 LTS trusty
Fixed 1.0.1f-1ubuntu2.26
openssl098 19.04 disco Not in release
18.10 cosmic Not in release
18.04 LTS bionic Not in release
17.10 artful Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release
openssl1.0 19.04 disco Not in release
18.10 cosmic
Fixed 1.0.2n-1ubuntu6
18.04 LTS bionic
Fixed 1.0.2n-1ubuntu5.1
17.10 artful Not in release
16.04 LTS xenial Not in release
14.04 LTS trusty Not in release

Notes


mdeslaur

USN-3628-1 was releases with a possible incomplete fix. Next USN should add the three first commits listed below

Severity score breakdown

Parameter Value
Base score 5.9 · Medium
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

References

Related Ubuntu Security Notices (USN)

Other references