Use of a Broken or Risky Cryptographic Algorithm Affecting openssl package, versions <1.1.0j-1~deb9u1
Snyk CVSS
Attack Complexity
High
Confidentiality
High
Threat Intelligence
EPSS
0.47% (76th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-OPENSSL-373432
- published 2 Dec 2018
- disclosed 29 Oct 2018
Introduced: 29 Oct 2018
CVE-2018-0735 Open this link in a new tabHow to fix?
Upgrade Debian:9
openssl
to version 1.1.0j-1~deb9u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream openssl
package and not the openssl
package as distributed by Debian
.
See How to fix?
for Debian:9
relevant fixed versions and status.
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).
References
- ADVISORY
- CONFIRM
- CONFIRM
- CONFIRM
- CVE Details
- Debian Security Advisory
- Debian Security Announcement
- MISC
- Netapp Security Advisory
- OpenSSL Security Advisory
- Oracle Security Advisory
- Oracle Security Advisory
- Oracle Security Advisory
- REDHAT
- Security Focus
- Security Tracker
- Ubuntu CVE Tracker
- Ubuntu Security Advisory
- openssl-security@openssl.org
- openssl-security@openssl.org