vulnerability
CentOS Linux: CVE-2018-0495: Moderate: openssl security, bug fix, and enhancement update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:M/Au:N/C:P/I:N/A:N) | 2018-06-13 | 2019-06-10 | 2023-05-25 |
Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
2018-06-13
Added
2019-06-10
Modified
2023-05-25
Description
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
Solution(s)
centos-upgrade-nsprcentos-upgrade-nspr-debuginfocentos-upgrade-nspr-develcentos-upgrade-nsscentos-upgrade-nss-debuginfocentos-upgrade-nss-develcentos-upgrade-nss-pkcs11-develcentos-upgrade-nss-softokncentos-upgrade-nss-softokn-debuginfocentos-upgrade-nss-softokn-develcentos-upgrade-nss-softokn-freeblcentos-upgrade-nss-softokn-freebl-develcentos-upgrade-nss-sysinitcentos-upgrade-nss-toolscentos-upgrade-nss-utilcentos-upgrade-nss-util-debuginfocentos-upgrade-nss-util-develcentos-upgrade-opensslcentos-upgrade-openssl-debuginfocentos-upgrade-openssl-develcentos-upgrade-openssl-libscentos-upgrade-openssl-perlcentos-upgrade-openssl-static

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.