vulnerability
Red Hat: CVE-2018-0495: Moderate: openssl security, bug fix, and enhancement update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:M/Au:N/C:P/I:N/A:N) | 2018-06-13 | 2018-10-31 | 2021-03-03 |
Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
2018-06-13
Added
2018-10-31
Modified
2021-03-03
Description
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
Solution(s)
redhat-upgrade-nsprredhat-upgrade-nspr-debuginforedhat-upgrade-nspr-develredhat-upgrade-nssredhat-upgrade-nss-debuginforedhat-upgrade-nss-develredhat-upgrade-nss-pkcs11-develredhat-upgrade-nss-softoknredhat-upgrade-nss-softokn-debuginforedhat-upgrade-nss-softokn-develredhat-upgrade-nss-softokn-freeblredhat-upgrade-nss-softokn-freebl-develredhat-upgrade-nss-sysinitredhat-upgrade-nss-toolsredhat-upgrade-nss-utilredhat-upgrade-nss-util-debuginforedhat-upgrade-nss-util-develredhat-upgrade-opensslredhat-upgrade-openssl-debuginforedhat-upgrade-openssl-develredhat-upgrade-openssl-libsredhat-upgrade-openssl-perlredhat-upgrade-openssl-static

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.