BSA-2018-636

Brocade Fabric OS

2 more products

21484

20 September 2019

02 July 2018

Closed

Medium

5.9

No

CVE-2018-0737

Summary

Security Advisory ID : BSA-2018-636

Component : OpenSSL

Revision : 2.0: Final


The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

Affected Products
Security updates have been provided in Brocade Fabric OS versions 8.2.2,8.2.1c,8.1.2h and Ficon Patches 8.1.2a7 8.2.0a4. This CVE is not applicable for 7.4.x versions.


Products Confirmed Not Vulnerable
Brocade Manageability Products are Not affected by this vulnerability.

Revision History

Version Change Date
1.0 Initial Publication  July 2, 2018
2.0 Updated with all releases September 20, 2019