CVE-2018-0495

Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
References
Link Resource
http://www.securitytracker.com/id/1041144 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041147 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:3221 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3505 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1296
https://access.redhat.com/errata/RHSA-2019:1297
https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/errata/RHSA-2019:2237
https://dev.gnupg.org/T4011 Patch Vendor Advisory
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965
https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html Mailing List Third Party Advisory
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html Vendor Advisory
https://usn.ubuntu.com/3689-1/ Third Party Advisory
https://usn.ubuntu.com/3689-2/ Third Party Advisory
https://usn.ubuntu.com/3692-1/ Third Party Advisory
https://usn.ubuntu.com/3692-2/ Third Party Advisory
https://usn.ubuntu.com/3850-1/ Third Party Advisory
https://usn.ubuntu.com/3850-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4231 Third Party Advisory
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ Exploit Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch Third Party Advisory
http://www.securitytracker.com/id/1041144 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041147 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:3221 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3505 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1296
https://access.redhat.com/errata/RHSA-2019:1297
https://access.redhat.com/errata/RHSA-2019:1543
https://access.redhat.com/errata/RHSA-2019:2237
https://dev.gnupg.org/T4011 Patch Vendor Advisory
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965
https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html Mailing List Third Party Advisory
https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html Vendor Advisory
https://usn.ubuntu.com/3689-1/ Third Party Advisory
https://usn.ubuntu.com/3689-2/ Third Party Advisory
https://usn.ubuntu.com/3692-1/ Third Party Advisory
https://usn.ubuntu.com/3692-2/ Third Party Advisory
https://usn.ubuntu.com/3850-1/ Third Party Advisory
https://usn.ubuntu.com/3850-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4231 Third Party Advisory
https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ Exploit Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*
cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:a:oracle:traffic_director:11.1.1.9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:38

Type Values Removed Values Added
References () http://www.securitytracker.com/id/1041144 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041144 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1041147 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041147 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:3221 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3221 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3505 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3505 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:1296 - () https://access.redhat.com/errata/RHSA-2019:1296 -
References () https://access.redhat.com/errata/RHSA-2019:1297 - () https://access.redhat.com/errata/RHSA-2019:1297 -
References () https://access.redhat.com/errata/RHSA-2019:1543 - () https://access.redhat.com/errata/RHSA-2019:1543 -
References () https://access.redhat.com/errata/RHSA-2019:2237 - () https://access.redhat.com/errata/RHSA-2019:2237 -
References () https://dev.gnupg.org/T4011 - Patch, Vendor Advisory () https://dev.gnupg.org/T4011 - Patch, Vendor Advisory
References () https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965 - () https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965 -
References () https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html - Mailing List, Third Party Advisory
References () https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html - Vendor Advisory () https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html - Vendor Advisory
References () https://usn.ubuntu.com/3689-1/ - Third Party Advisory () https://usn.ubuntu.com/3689-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3689-2/ - Third Party Advisory () https://usn.ubuntu.com/3689-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3692-1/ - Third Party Advisory () https://usn.ubuntu.com/3692-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3692-2/ - Third Party Advisory () https://usn.ubuntu.com/3692-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3850-1/ - Third Party Advisory () https://usn.ubuntu.com/3850-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3850-2/ - Third Party Advisory () https://usn.ubuntu.com/3850-2/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4231 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4231 - Third Party Advisory
References () https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ - Exploit, Third Party Advisory () https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ - Exploit, Third Party Advisory
References () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Patch, Third Party Advisory () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Patch, Third Party Advisory

07 Nov 2023, 02:51

Type Values Removed Values Added
References
  • {'url': 'https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965', 'name': 'https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=9010d1576e278a4274ad3f4aa15776c28f6ba965', 'tags': ['Patch', 'Vendor Advisory'], 'refsource': 'MISC'}
  • () https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965 -

Information

Published : 2018-06-13 23:29

Updated : 2024-11-21 03:38


NVD link : CVE-2018-0495

Mitre link : CVE-2018-0495

CVE.ORG link : CVE-2018-0495


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • ansible_tower
  • enterprise_linux_workstation

canonical

  • ubuntu_linux

oracle

  • traffic_director

gnupg

  • libgcrypt

debian

  • debian_linux
CWE
CWE-203

Observable Discrepancy