First published: Wed Jun 13 2018(Updated: )
An implementation flaw was discovered in multiple cryptographic libraries that allows a side-channel based attacker to recover ECDSA or DSA private keys. When these cryptographic libraries use the private key to create a signature, such as for a TLS or SSH connection, they inadvertently leak information through memory caches. An unprivileged attacker running on the same machine can collect the information from a few thousand signatures and recover the value of the private key. External References: <a href="https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/">https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/</a>
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-httpd | <0:2.4.29-40.jbcs.el6 | 0:2.4.29-40.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.0.2n-15.jbcs.el6 | 1:1.0.2n-15.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.29-40.jbcs.el7 | 0:2.4.29-40.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.0.2n-15.jbcs.el7 | 1:1.0.2n-15.jbcs.el7 |
redhat/openssl | <1:1.0.2k-16.el7 | 1:1.0.2k-16.el7 |
redhat/nspr | <0:4.21.0-1.el7 | 0:4.21.0-1.el7 |
redhat/nss | <0:3.44.0-4.el7 | 0:3.44.0-4.el7 |
redhat/nss-softokn | <0:3.44.0-5.el7 | 0:3.44.0-5.el7 |
redhat/nss-util | <0:3.44.0-3.el7 | 0:3.44.0-3.el7 |
redhat/nss-softokn | <0:3.28.3-9.el7_4 | 0:3.28.3-9.el7_4 |
redhat/nss-softokn | <0:3.36.0-6.el7_5 | 0:3.36.0-6.el7_5 |
redhat/nss-softokn | <0:3.36.0-6.el7_6 | 0:3.36.0-6.el7_6 |
debian/libgcrypt20 | 1.8.7-6 1.10.1-3 1.11.0-7 | |
Libgcrypt | <1.7.10 | |
Libgcrypt | >=1.8.0<1.8.3 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Debian | =8.0 | |
Debian | =9.0 | |
Red Hat Ansible Tower | =3.3 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Oracle Traffic Director | =11.1.1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-0495 is rated as high severity due to the potential for private key recovery through a side-channel attack.
To mitigate CVE-2018-0495, update to the fixed versions of the affected packages listed in the vulnerability report.
CVE-2018-0495 affects several cryptographic libraries including jbcs-httpd24-httpd and jbcs-httpd24-openssl among others.
CVE-2018-0495 enables a side-channel attack that can lead to the recovery of ECDSA or DSA private keys.
CVE-2018-0495 affects multiple operating systems, including various versions of Red Hat Enterprise Linux and Debian.