CVE-2018-0734

Updated: 2025-08-20 02:29:02.368569

Description:

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x MEDIUM 4.3
CVSS Version 3.x MEDIUM 5.9

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU openssl 3.0.7 5.9 MEDIUM Ignored 2025-09-09 10:42:43 This issue only affects OpenSSL when performing DSA signing; verification and other signature algori...
Alpine Linux 3.18 ELS openssl 3.1.8 5.9 MEDIUM Ignored 2025-09-09 10:42:42 Ignored due to low severity
CentOS 6 ELS openssl 1.0.1e 5.9 MEDIUM Released CLSA-2025:1760559298 2025-10-24 19:41:51
CentOS 7 ELS openssl 1.0.2k 5.9 MEDIUM Ignored 2025-09-09 10:42:42 Ignored due to low severity
CentOS 8.4 ELS openssl 1.1.1g 5.9 MEDIUM Ignored 2025-09-09 10:42:44 Ignored due to low severity
CentOS 8.5 ELS openssl 1.1.1k 5.9 MEDIUM Ignored 2025-09-09 10:42:44 Ignored due to low severity
CentOS Stream 8 ELS openssl 1.1.1k 5.9 MEDIUM Ignored 2025-09-09 10:42:46 Ignored due to low severity
CloudLinux 7 ELS openssl 1.0.2k 5.9 MEDIUM Ignored 2025-09-09 10:42:48 Ignored due to low severity
Debian 10 ELS openssl 1.1.1n 5.9 MEDIUM Ignored 2025-10-11 00:21:39 Ignored due to low severity
Oracle Linux 6 ELS openssl 1.0.1e 5.9 MEDIUM Released CLSA-2025:1760556795 2025-10-15 20:42:21
Total: 16