First published: Thu Oct 25 2018(Updated: )
A flaw was found in OpenSSL versions from 1.1.0 through 1.1.0i inclusive and version 1.1.1. The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. References: <a href="https://www.openssl.org/news/secadv/20181029.txt">https://www.openssl.org/news/secadv/20181029.txt</a> Upstream Patch: <a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56fb454d281a023b3f950d969693553d3f3ceea1">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56fb454d281a023b3f950d969693553d3f3ceea1</a> <a href="https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4">https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4</a>
Credit: openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openssl | <1:1.0.2k-16.el7_6.1 | 1:1.0.2k-16.el7_6.1 |
redhat/openssl | <1:1.1.1c-2.el8 | 1:1.1.1c-2.el8 |
redhat/openssl | <1.1.0 | 1.1.0 |
redhat/openssl | <1.1.1 | 1.1.1 |
OpenSSL OpenSSL | >=1.1.0<=1.1.0i | |
OpenSSL OpenSSL | =1.1.1 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Nodejs Node.js | >=10.0.0<10.12.0 | |
Nodejs Node.js | >=11.0.0<11.3.0 | |
Nodejs Node.js | =10.13.0 | |
Netapp Cn1610 Firmware | ||
Netapp Cn1610 | ||
Netapp Cloud Backup | ||
Netapp Element Software | ||
Netapp Oncommand Unified Manager | ||
Netapp Oncommand Unified Manager Vsphere | >=9.4 | |
Netapp Santricity Smi-s Provider | ||
Netapp Smi-s Provider | ||
Netapp Snapdrive Unix | ||
Netapp Snapdrive Windows | ||
Netapp Steelstore | ||
Oracle API Gateway | =11.1.2.4.0 | |
Oracle Application Server | =0.9.8 | |
Oracle Application Server | =1.0.0 | |
Oracle Application Server | =1.0.1 | |
Oracle Enterprise Manager Base Platform | =12.1.0.5.0 | |
Oracle Enterprise Manager Base Platform | =13.2.0.0.0 | |
Oracle Enterprise Manager Base Platform | =13.3.0.0.0 | |
Oracle Enterprise Manager Ops Center | =12.3.3 | |
Oracle MySQL | <=5.6.42 | |
Oracle MySQL | >=5.7.0<=5.7.24 | |
Oracle MySQL | >=8.0.0<=8.0.13 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.55 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.56 | |
Oracle PeopleSoft Enterprise PeopleTools | =8.57 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | >=17.7<=17.12 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =8.4 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =15.1 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =15.2 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =16.1 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =16.2 | |
Oracle Primavera P6 Enterprise Project Portfolio Management | =18.8 | |
Oracle Secure Global Desktop | =5.4 | |
Oracle Tuxedo | =12.1.1.0.0 | |
Oracle VM VirtualBox | <6.0.0 | |
Oracle VM VirtualBox | >=5.0.0<5.2.24 | |
All of | ||
Netapp Cn1610 Firmware | ||
Netapp Cn1610 | ||
debian/openssl | 1.1.1w-0+deb11u1 1.1.1n-0+deb11u5 3.0.14-1~deb12u1 3.0.14-1~deb12u2 3.3.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.