Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1405-1 | libgcrypt20 security update |
![]() |
DSA-4231-1 | libgcrypt20 security update |
![]() |
EUVD-2018-1318 | Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. |
![]() |
USN-3689-1 | Libgcrypt vulnerability |
![]() |
USN-3689-2 | Libgcrypt vulnerability |
![]() |
USN-3692-1 | OpenSSL vulnerabilities |
![]() |
USN-3692-2 | OpenSSL vulnerabilities |
![]() |
USN-3850-1 | NSS vulnerabilities |
![]() |
USN-3850-2 | NSS vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|

Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-05T03:28:10.586Z
Reserved: 2017-11-27T00:00:00
Link: CVE-2018-0495

No data.

Status : Modified
Published: 2018-06-13T23:29:00.333
Modified: 2024-11-21T03:38:21.160
Link: CVE-2018-0495


No data.