{"id":"UBUNTU-CVE-2018-0735","details":"The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).","modified":"2026-04-22T11:38:19.349114Z","published":"2018-10-29T00:00:00Z","related":["USN-3840-1"],"upstream":["CVE-2018-0735"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-0735"},{"type":"REPORT","url":"https://www.openssl.org/news/secadv/20181029.txt"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3840-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-0735"}],"affected":[{"package":{"name":"openssl","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/openssl@1.1.0g-2ubuntu4.3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.1.0g-2ubuntu4.3"}]}],"versions":["1.0.2g-1ubuntu13","1.0.2g-1ubuntu14","1.0.2n-1ubuntu1","1.1.0g-2ubuntu1","1.1.0g-2ubuntu2","1.1.0g-2ubuntu3","1.1.0g-2ubuntu4","1.1.0g-2ubuntu4.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1.1.0g-2ubuntu4.3","binary_name":"libssl1.1"},{"binary_version":"1.1.0g-2ubuntu4.3","binary_name":"openssl"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-0735.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}]}