The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).
Project Subscriptions
| Vendors | Products |
|---|---|
|
Canonical
Subscribe
|
Ubuntu Linux
Subscribe
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Netapp
Subscribe
|
|
|
Nodejs
Subscribe
|
Node.js
Subscribe
|
|
Openssl
Subscribe
|
Openssl
Subscribe
|
|
Oracle
Subscribe
|
Api Gateway
Subscribe
Application Server
Subscribe
Enterprise Manager Base Platform
Subscribe
Enterprise Manager Ops Center
Subscribe
Mysql
Subscribe
Peoplesoft Enterprise Peopletools
Subscribe
Primavera P6 Enterprise Project Portfolio Management
Subscribe
Secure Global Desktop
Subscribe
Tuxedo
Subscribe
Vm Virtualbox
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1586-1 | openssl security update |
Debian DSA |
DSA-4348-1 | openssl security update |
EUVD |
EUVD-2018-1545 | The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1). |
Ubuntu USN |
USN-3840-1 | OpenSSL vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: openssl
Published:
Updated: 2024-09-16T19:10:32.005Z
Reserved: 2017-11-30T00:00:00
Link: CVE-2018-0735
No data.
Status : Modified
Published: 2018-10-29T13:29:00.263
Modified: 2024-11-21T03:38:50.413
Link: CVE-2018-0735
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN