First published: Mon Apr 16 2018(Updated: )
Last updated 24 July 2024
Credit: openssl-security@openssl.org openssl-security@openssl.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSSL OpenSSL | >=1.0.2b<=1.0.2o | |
OpenSSL OpenSSL | >=1.1.0<=1.1.0h | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
redhat/openssl | <1.1.0 | 1.1.0 |
redhat/openssl | <1.0.2 | 1.0.2 |
IBM Security Verify Governance | <=10.0 | |
debian/openssl | 1.1.1w-0+deb11u1 1.1.1w-0+deb11u2 3.0.15-1~deb12u1 3.0.14-1~deb12u2 3.3.2-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this OpenSSL vulnerability is CVE-2018-0737.
CVE-2018-0737 has a severity of medium (5.9).
The affected software for CVE-2018-0737 includes OpenSSL versions 1.1.0-1.1.0h and 1.0.2b-1.0.2o.
To fix the CVE-2018-0737 vulnerability in OpenSSL, upgrade to version 1.1.0i or later (for 1.1.0 branch) or 1.0.2p or later (for 1.0.2 branch).
You can find more information about CVE-2018-0737 in the OpenSSL security advisory (https://www.openssl.org/news/secadv/20180416.txt) and the OSS-Security mailing list (http://www.openwall.com/lists/oss-security/2018/04/16/3).