{"id":"CVE-2018-0495","details":"Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.","modified":"2026-04-16T06:17:05.576596430Z","published":"2018-06-13T23:29:00.333Z","related":["SUSE-SU-2018:1993-1","SUSE-SU-2018:2089-1","SUSE-SU-2018:2452-2","SUSE-SU-2018:4235-1","SUSE-SU-2018:4236-1","SUSE-SU-2018:4236-2","openSUSE-SU-2024:10941-1","openSUSE-SU-2024:11058-1"],"references":[{"type":"WEB","url":"https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=9010d1576e278a4274ad3f4aa15776c28f6ba965"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041144"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2237"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3689-2/"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041147"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3221"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3505"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1296"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1297"},{"type":"ADVISORY","url":"https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000426.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3692-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3850-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3692-1/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3850-2/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1543"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/06/msg00013.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3689-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4231"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"type":"FIX","url":"https://dev.gnupg.org/T4011"},{"type":"EVIDENCE","url":"https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/"}],"affected":[{"ranges":[{"type":"GIT","repo":"git://git.gnupg.org/libgcrypt.git","events":[{"introduced":"0"},{"fixed":"ff8f7e53ce6b8a5681667595c6287323652ae157"},{"introduced":"850aca744eeda5fd410f478a0778e353045ac962"},{"fixed":"5600d2d6b23640b0114655214f18959ee81fe58e"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.7.10"},{"introduced":"1.8.0"},{"fixed":"1.8.3"}]}}],"versions":["DEVEL-BRANCH-1-1","V-0-2-8","V0-0-0","V0-1-0","V0-2-0","V0-2-10","V0-2-15","V0-2-17","V0-2-18","V0-2-19","V0-2-6","V0-3-0","V0-3-1","V0-3-2","V0-3-3","V0-3-4","V0-3-5","V0-4-0","V0-4-1","V0-4-2","V0-4-3","V0-4-4","V0-4-5","V0-9-0","V0-9-1","V0-9-10","V0-9-11","V0-9-2","V0-9-3","V0-9-4","V0-9-5","V0-9-6","V0-9-7","V0-9-8","V0-9-9","V1-0-0","V1-0-1","V1-0-1-ePit-1","V1-0-2","V1-0-3","V1-0-4","V1-1-0","V1-1-10","V1-1-11","V1-1-12","V1-1-2","V1-1-3","V1-1-4","V1-1-42","V1-1-43","V1-1-44","V1-1-5","V1-1-6","V1-1-7","V1-1-8","V1-1-9","V1-1-90","V1-1-91","V1-1-92","V1-1-93","V1-1-94","V1-2-0","V1-2-1","ecc-integration-done","last-gpl-version","libgcrypt-1.3.0","libgcrypt-1.3.1","libgcrypt-1.3.2","libgcrypt-1.4.0","libgcrypt-1.4.1","libgcrypt-1.4.1rc1","libgcrypt-1.4.2","libgcrypt-1.4.2rc1","libgcrypt-1.4.2rc2","libgcrypt-1.4.3","libgcrypt-1.4.4","libgcrypt-1.5.0","libgcrypt-1.5.0-beta1","libgcrypt-1.6.0","libgcrypt-1.7.0","libgcrypt-1.7.1","libgcrypt-1.7.2","libgcrypt-1.7.3","libgcrypt-1.7.4","libgcrypt-1.7.5","libgcrypt-1.7.6","libgcrypt-1.7.7","libgcrypt-1.7.8","libgcrypt-1.7.9","libgcrypt-1.8.0","libgcrypt-1.8.1","libgcrypt-1.8.2","marcus-after-thread-cbs","marcus-before-thread-cbs","now-less-freedom-protected","post-nuke-of-trailing-ws"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-0495.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"3.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.1.1.9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}