Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h7hf-9wc6-h849

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.

Ссылки

EPSS

Процентиль: 64%
0.0047
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.

redhat
больше 11 лет назад

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.

nvd
больше 11 лет назад

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.

debian
больше 11 лет назад

The Montgomery ladder implementation in OpenSSL through 1.0.0l does no ...

fstec
больше 11 лет назад

Уязвимость программного обеспечения Cisco Unified Communications Manager, позволяющая злоумышленнику получить одноразовый код (nonce) ECDSA

EPSS

Процентиль: 64%
0.0047
Низкий