Search CVE reports


Toggle filters

81 – 90 of 279 results


CVE-2018-0737

Low priority
Fixed

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover...

3 affected packages

openssl, openssl098, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Fixed
openssl098 Not in release
openssl1.0 Fixed
Show less packages

CVE-2018-0735

Low priority
Fixed

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j...

3 affected packages

openssl, openssl098, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Fixed Fixed
openssl098 Not in release Not in release
openssl1.0 Not in release Not affected
Show less packages

CVE-2018-0734

Low priority
Fixed

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1)....

3 affected packages

openssl, openssl098, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Fixed Fixed
openssl098 Not in release Not in release
openssl1.0 Not in release Fixed
Show less packages

CVE-2018-0733

Medium priority
Not affected

Because of an implementation bug the PA-RISC CRYPTO_memcmp function is effectively reduced to only comparing the least significant bit of each byte. This allows an attacker to forge messages that would be considered...

3 affected packages

openssl, openssl098, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
openssl098
openssl1.0
Show less packages

CVE-2018-0732

Low priority
Fixed

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key...

3 affected packages

openssl, openssl098, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Fixed
openssl098 Not in release
openssl1.0 Fixed
Show less packages

CVE-2018-0495

Low priority

Some fixes available 18 of 19

Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in...

6 affected packages

libgcrypt11, nss, openssl098, libgcrypt20, openssl, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libgcrypt11 Not in release
nss Fixed
openssl098 Not in release
libgcrypt20 Fixed
openssl Fixed
openssl1.0 Fixed
Show less packages

CVE-2017-3738

Low priority
Fixed

There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect...

3 affected packages

openssl098, openssl1.0, openssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl098 Not in release
openssl1.0 Not affected
openssl Fixed
Show less packages

CVE-2017-3737

Medium priority
Fixed

OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you...

1 affected package

openssl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl
Show less packages

CVE-2017-3736

Medium priority
Fixed

There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this...

2 affected packages

openssl, openssl098

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Fixed
openssl098 Not in release
Show less packages

CVE-2017-3735

Low priority
Fixed

While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present...

3 affected packages

openssl, openssl098, openssl1.0

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
openssl Fixed
openssl098 Not in release
openssl1.0 Not affected
Show less packages