Updated: 2026-02-27 00:21:05.533844
Description:
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | MEDIUM | 4.3 |
| CVSS Version 3.x | MEDIUM | 5.9 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | openssl | 3.0.7 | 5.9 | MEDIUM | Not Vulnerable | 2025-09-30 05:34:09 | Not affected: CVE-2018-0737 impacts only OpenSSL 1.0.2b–1.0.2o and 1.1.0–1.1.0h (fixed in 1.0.2p... | |
| Alpine Linux 3.18 ELS | openssl | 3.1.8 | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:50 | Ignored due to low severity | |
| CentOS 6 ELS | openssl | 1.0.1e | 5.9 | MEDIUM | Released | CLSA-2021:1632262317 | 2022-05-05 12:01:45 | |
| CentOS 7 ELS | openssl | 1.0.2k | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:49 | Ignored due to low severity | |
| CentOS 8.4 ELS | openssl | 1.1.1g | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:52 | Ignored due to low severity | |
| CentOS 8.5 ELS | openssl | 1.1.1k | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:51 | Ignored due to low severity | |
| CentOS Stream 8 ELS | openssl | 1.1.1k | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:53 | Ignored due to low severity | |
| CloudLinux 6 ELS | openssl | 1.0.1e | 5.9 | MEDIUM | Released | 2021-11-02 14:03:17 | ||
| CloudLinux 7 ELS | openssl | 1.0.2k | 5.9 | MEDIUM | Ignored | 2025-09-09 10:42:54 | Ignored due to low severity | |
| Oracle Linux 6 ELS | openssl | 1.0.1e | 5.9 | MEDIUM | Not Vulnerable | CLSA-2021:1634922881 | 2021-11-02 14:03:17 | Not affected: CVE-2018-0737 only impacts OpenSSL 1.0.2b–1.0.2o and 1.1.0–1.1.0h (fixed in 1.0.2p... |