Updated: 2025-08-20 02:29:02.368569
Description:
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | MEDIUM | 4.3 |
| CVSS Version 3.x | MEDIUM | 5.9 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| Oracle Linux 7 ELS | openssl | 1.0.2k | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:47 | Ignored due to low severity | |
| RHEL 7 ELS | openssl | 1.0.2k | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:43 | Ignored due to low severity | |
| TuxCare 9.6 ESU | openssl | 3.2.2 | 5.9 | MEDIUM | Not Vulnerable | 2025-12-23 01:30:59 | This flaw is only reachable when OpenSSL performs DSA signatures on affected pre‑fix releases, so ... | |
| Ubuntu 16.04 ELS | openssl | 1.0.2g-1 | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:46 | Ignored due to low severity | |
| Ubuntu 18.04 ELS | openssl | 1.1.1-1 | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:48 | Ignored due to low severity | |
| Ubuntu 20.04 ELS | openssl | 1.1.1f | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:45 | Ignored due to low severity |