[3.8] openssl: Cache timing vulnerability in RSA Key Generation (CVE-2018-0737)
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable
to a
cache timing side channel attack. An attacker with sufficient access to
mount
cache timing attacks during the RSA key generation process could recover
the
private key.
Due to the low severity of this issue we are not issuing a new release
of
OpenSSL 1.1.0 or 1.0.2 at this time. The fix will be included in OpenSSL
1.1.0i
and OpenSSL 1.0.2p when they become available. The fix is also available
in
commit 6939eab03 (for 1.1.0) and commit 349a41da1 (for 1.0.2) in the
OpenSSL git
repository.
References:
https://www.openssl.org/news/secadv/20180416.txt
https://nvd.nist.gov/vuln/detail/CVE-2018-0737
(from redmine: issue id 8813, created on 2018-04-19, closed on 2018-07-19)
- Relations:
- copied_to #8812 (closed)
- parent #8812 (closed)
- Changesets:
- Revision f528d051 by Timo Teräs on 2018-07-18T07:21:25Z:
main/openssl: cherry-pick fix for CVE-2018-0737
fixes #8813
- Revision 0c38f925 by Timo Teräs on 2018-11-22T13:18:47Z:
main/openssl: cherry-pick fix for CVE-2018-0737
fixes #8813