Vulnerability Change Records for CVE-2018-0735

Change History

Initial Analysis 1/29/2019 12:36:18 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:netapp:cn1610:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:santricity_smi-s_provider:-:*:*:*:*:*:*:*
     *cpe:2.3:a:netapp:steelstore:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:* versions from (including) 10.13.0 up to (including) 10.14.1
     *cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:* versions from (including) 11.0.0 up to (including) 11.4.0
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:* versions from (including) 1.1.0 up to (including) 1.1.0i
     *cpe:2.3:a:openssl:openssl:1.1.1:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Added CVSS V3

								
							
							
						
AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Added CWE

								
							
							
						
CWE-320
Changed Reference Type
http://www.securityfocus.com/bid/105750 No Types Assigned
http://www.securityfocus.com/bid/105750 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1041986 No Types Assigned
http://www.securitytracker.com/id/1041986 Third Party Advisory, VDB Entry
Changed Reference Type
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56fb454d281a023b3f950d969693553d3f3ceea1 No Types Assigned
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=56fb454d281a023b3f950d969693553d3f3ceea1 Patch, Third Party Advisory
Changed Reference Type
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4 No Types Assigned
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4 Patch, Third Party Advisory
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html No Types Assigned
https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html Third Party Advisory
Changed Reference Type
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ No Types Assigned
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ Third Party Advisory
Changed Reference Type
https://security.netapp.com/advisory/ntap-20181105-0002/ No Types Assigned
https://security.netapp.com/advisory/ntap-20181105-0002/ Third Party Advisory
Changed Reference Type
https://usn.ubuntu.com/3840-1/ No Types Assigned
https://usn.ubuntu.com/3840-1/ Third Party Advisory
Changed Reference Type
https://www.debian.org/security/2018/dsa-4348 No Types Assigned
https://www.debian.org/security/2018/dsa-4348 Third Party Advisory
Changed Reference Type
https://www.openssl.org/news/secadv/20181029.txt No Types Assigned
https://www.openssl.org/news/secadv/20181029.txt Vendor Advisory
Changed Reference Type
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html No Types Assigned
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html Third Party Advisory

CVE Modified by OpenSSL Software Foundation 10/29/2018 2:29:00 PM

Action Type Old Value New Value
Changed Description
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j-dev (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a-dev (Affected 1.1.1).

CVE Modified by OpenSSL Software Foundation 1/15/2020 3:15:15 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://www.oracle.com/security-alerts/cpujan2020.html [No Types Assigned]

CVE Modified by OpenSSL Software Foundation 11/20/2018 11:29:00 AM

Action Type Old Value New Value
Changed Description
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j-dev (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a-dev (Affected 1.1.1).
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVE Modified by OpenSSL Software Foundation 12/07/2018 6:29:22 AM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://usn.ubuntu.com/3840-1/ [No Types Assigned]

CVE Modified by OpenSSL Software Foundation 4/23/2019 3:31:31 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html [No Types Assigned]

CVE Modified by OpenSSL Software Foundation 11/05/2019 8:15:15 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://access.redhat.com/errata/RHSA-2019:3700 [No Types Assigned]

CWE Remap 8/24/2020 1:37:01 PM

Action Type Old Value New Value
Changed CWE
CWE-320
CWE-327

CVE Modified by OpenSSL Software Foundation 7/23/2019 7:15:25 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html [No Types Assigned]

CVE Modified by OpenSSL Software Foundation 11/22/2018 6:29:01 AM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html [No Types Assigned]

CVE Modified by OpenSSL Software Foundation 1/16/2019 2:29:27 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html [No Types Assigned]

CVE Modified by OpenSSL Software Foundation 12/01/2018 6:29:13 AM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://www.debian.org/security/2018/dsa-4348 [No Types Assigned]

CVE Modified by OpenSSL Software Foundation 11/29/2018 10:29:00 AM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ [No Types Assigned]

CVE Modified by OpenSSL Software Foundation 10/30/2018 6:29:06 AM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.securityfocus.com/bid/105750 [No Types Assigned]
Added Reference

								
							
							
						
http://www.securitytracker.com/id/1041986 [No Types Assigned]

CVE Modified by OpenSSL Software Foundation 11/06/2018 6:29:01 AM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://security.netapp.com/advisory/ntap-20181105-0002/ [No Types Assigned]