Updated: 2025-08-20 02:29:02.368569
Description:
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | MEDIUM | 4.3 |
| CVSS Version 3.x | MEDIUM | 5.9 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | openssl | 3.0.7 | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:43 | This issue only affects OpenSSL when performing DSA signing; verification and other signature algori... | |
| Alpine Linux 3.18 ELS | openssl | 3.1.8 | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:42 | Ignored due to low severity | |
| CentOS 6 ELS | openssl | 1.0.1e | 5.9 | MEDIUM | Released | CLSA-2025:1760559298 | 2025-10-24 19:41:51 | |
| CentOS 7 ELS | openssl | 1.0.2k | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:42 | Ignored due to low severity | |
| CentOS 8.4 ELS | openssl | 1.1.1g | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:44 | Ignored due to low severity | |
| CentOS 8.5 ELS | openssl | 1.1.1k | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:44 | Ignored due to low severity | |
| CentOS Stream 8 ELS | openssl | 1.1.1k | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:46 | Ignored due to low severity | |
| CloudLinux 7 ELS | openssl | 1.0.2k | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:48 | Ignored due to low severity | |
| Debian 10 ELS | openssl | 1.1.1n | 5.9 | MEDIUM | Ignored | 2025-10-11 00:21:39 | Ignored due to low severity | |
| Oracle Linux 6 ELS | openssl | 1.0.1e | 5.9 | MEDIUM | Released | CLSA-2025:1760556795 | 2025-10-15 20:42:21 |