CVE-2018-0734

Updated: 2025-08-20 02:29:02.368569

Description:

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x MEDIUM 4.3
CVSS Version 3.x MEDIUM 5.9

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Oracle Linux 7 ELS openssl 1.0.2k 5.9 MEDIUM Ignored 2025-09-09 10:42:47 Ignored due to low severity
RHEL 7 ELS openssl 1.0.2k 5.9 MEDIUM Ignored 2025-09-09 10:42:43 Ignored due to low severity
TuxCare 9.6 ESU openssl 3.2.2 5.9 MEDIUM Not Vulnerable 2025-12-23 01:30:59 This flaw is only reachable when OpenSSL performs DSA signatures on affected pre‑fix releases, so ...
Ubuntu 16.04 ELS openssl 1.0.2g-1 5.9 MEDIUM Ignored 2025-09-09 10:42:46 Ignored due to low severity
Ubuntu 18.04 ELS openssl 1.1.1-1 5.9 MEDIUM Ignored 2025-09-09 10:42:48 Ignored due to low severity
Ubuntu 20.04 ELS openssl 1.1.1f 5.9 MEDIUM Ignored 2025-09-09 10:42:45 Ignored due to low severity
Total: 16