First published: Tue Oct 16 2018(Updated: )
A flaw was found in OpenSSL versions from 1.1.0 through 1.1.0i inclusive, from 1.0.2 through 1.0.2p inclusive and version 1.1.1. The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Reference: <a href="https://www.openssl.org/news/secadv/20181030.txt">https://www.openssl.org/news/secadv/20181030.txt</a> Upstream Patches: <a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=43e6a58d4991a451daf4891ff05a48735df871ac">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=43e6a58d4991a451daf4891ff05a48735df871ac</a> <a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8abfe72e8c1de1b95f50aa0d9134803b4d00070f</a> <a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ef11e19d1365eea2b1851e6f540a0bf365d303e7</a> <a href="https://github.com/openssl/openssl/commit/b96bebacfe814deb99fb64a3ed2296d95c573600">https://github.com/openssl/openssl/commit/b96bebacfe814deb99fb64a3ed2296d95c573600</a>
Credit: openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-apr | <0:1.6.3-63.jbcs.el6 | 0:1.6.3-63.jbcs.el6 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-48.jbcs.el6 | 0:1.6.1-48.jbcs.el6 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-7.jbcs.el6 | 0:1.0.6-7.jbcs.el6 |
redhat/jbcs-httpd24-curl | <0:7.64.1-14.jbcs.el6 | 0:7.64.1-14.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-33.jbcs.el6 | 0:2.4.37-33.jbcs.el6 |
redhat/jbcs-httpd24-jansson | <0:2.11-20.jbcs.el6 | 0:2.11-20.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-4.jbcs.el6 | 0:1.39.2-4.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.1.1-25.jbcs.el6 | 1:1.1.1-25.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-63.jbcs.el7 | 0:1.6.3-63.jbcs.el7 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-48.jbcs.el7 | 0:1.6.1-48.jbcs.el7 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-7.jbcs.el7 | 0:1.0.6-7.jbcs.el7 |
redhat/jbcs-httpd24-curl | <0:7.64.1-14.jbcs.el7 | 0:7.64.1-14.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-33.jbcs.el7 | 0:2.4.37-33.jbcs.el7 |
redhat/jbcs-httpd24-jansson | <0:2.11-20.jbcs.el7 | 0:2.11-20.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-4.jbcs.el7 | 0:1.39.2-4.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1-25.jbcs.el7 | 1:1.1.1-25.jbcs.el7 |
redhat/openssl | <1:1.0.2k-19.el7 | 1:1.0.2k-19.el7 |
redhat/openssl | <1:1.1.1c-2.el8 | 1:1.1.1c-2.el8 |
redhat/openssl | <1.1.0 | 1.1.0 |
redhat/openssl | <1.1.1 | 1.1.1 |
redhat/openssl | <1.0.2 | 1.0.2 |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1n-0+deb11u5 3.0.14-1~deb12u1 3.0.14-1~deb12u2 3.3.2-1 | |
IBM Security Verify Governance - Identity Manager | <=10.0 | |
OpenSSL | >=1.0.2<=1.0.2p | |
OpenSSL | >=1.1.0<=1.1.0i | |
OpenSSL | =1.1.1 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Debian Linux | =9.0 | |
Node.js | >=6.0.0<=6.8.1 | |
Node.js | >=6.9.0<6.15.0 | |
Node.js | >=8.0.0<=8.8.1 | |
Node.js | >=8.9.0<8.14.0 | |
Node.js | >=10.0.0<=10.12.0 | |
Node.js | >=11.0.0<11.3.0 | |
Node.js | =10.13.0 | |
All of | ||
NetApp CN1610 | ||
NetApp CN1610 Firmware | ||
NetApp Cloud Backup | ||
NetApp OnCommand Unified Manager for Windows | ||
NetApp SANtricity SMI-S Provider Firmware | ||
NetApp SnapCenter | ||
NetApp SteelStore Cloud Integrated Storage | ||
NetApp Storage Automation Store | ||
Oracle API Gateway | =11.1.2.4.0 | |
Oracle E-Business Suite | =0.9.8 | |
Oracle E-Business Suite | =1.0.0 | |
Oracle E-Business Suite | =1.0.1 | |
Oracle Enterprise Manager | =12.1.0.5.0 | |
Oracle Enterprise Manager | =13.2.0.0.0 | |
Oracle Enterprise Manager | =13.3.0.0.0 | |
Oracle Enterprise Manager Ops Center | =12.3.3 | |
Oracle MySQL Enterprise Backup | >=3.0<=3.12.3 | |
Oracle MySQL Enterprise Backup | >=4.0<=4.1.2 | |
Oracle PeopleTools | =8.55 | |
Oracle PeopleTools | =8.56 | |
Oracle PeopleTools | =8.57 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | >=17.7<=17.12 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =8.4 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =15.1 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =15.2 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =16.1 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =16.2 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =18.8 | |
Oracle Tuxedo | =12.1.1.0.0 | |
NetApp CN1610 | ||
NetApp CN1610 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-0734 is classified as a medium severity vulnerability due to its potential for a timing side channel attack on the OpenSSL DSA signature algorithm.
To mitigate CVE-2018-0734, upgrade OpenSSL to a version that is not vulnerable, such as 1.1.1 or appropriate patched versions indicated by the vendor.
CVE-2018-0734 affects OpenSSL versions from 1.1.0 through 1.1.0i inclusive, 1.0.2 through 1.0.2p inclusive, and version 1.1.1.
CVE-2018-0734 can be exploited using timing side channel attacks that could allow an attacker to recover private keys during signature operations.
CVE-2018-0734 is specifically related to certain versions of OpenSSL and may not apply to other cryptographic implementations.