First published: Thu Apr 19 2018(Updated: )
Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis Manuel Alvarez Tapia discovered that OpenSSL incorrectly handled RSA key generation. An attacker could possibly use this issue to perform a cache-timing attack and recover private RSA keys.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libssl1.0.0 | <1.0.2g-1ubuntu13.5 | 1.0.2g-1ubuntu13.5 |
Ubuntu OpenSSH Client | =17.10 | |
All of | ||
ubuntu/libssl1.0.0 | <1.0.2g-1ubuntu4.12 | 1.0.2g-1ubuntu4.12 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/libssl1.0.0 | <1.0.1f-1ubuntu2.25 | 1.0.1f-1ubuntu2.25 |
Ubuntu OpenSSH Client | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The USN for this OpenSSL vulnerability is USN-3628-1.
Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia, and Luis Manuel Alvarez Tapia discovered the OpenSSL vulnerability.
The OpenSSL vulnerability allows an attacker to perform a cache-timing attack and recover private RSA keys.
The versions affected by this OpenSSL vulnerability are 1.0.2g-1ubuntu13.5, 1.0.2g-1ubuntu4.12, and 1.0.1f-1ubuntu2.25.
To fix this OpenSSL vulnerability, update libssl1.0.0 to the appropriate remedial versions: 1.0.2g-1ubuntu13.5, 1.0.2g-1ubuntu4.12, or 1.0.1f-1ubuntu2.25.