Описание
The RSA-CRT implementation in PolarSSL before 1.2.9 does not properly perform Montgomery multiplication, which might allow remote attackers to conduct a timing side-channel attack and retrieve RSA private keys.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1.3.4-1 |
esm-apps/xenial | not-affected | 1.3.4-1 |
esm-infra-legacy/trusty | DNE | |
precise | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 1.2.9 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [1.3.4-1]] |
lucid | ignored | end of life |
precise | ignored | end of life |
precise/esm | DNE | precise was needs-triage |
quantal | ignored | end of life |
raring | ignored | end of life |
saucy | ignored | end of life |
trusty | not-affected | 1.3.4-1 |
trusty/esm | DNE | trusty was not-affected [1.3.4-1] |
Показывать по
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
The RSA-CRT implementation in PolarSSL before 1.2.9 does not properly perform Montgomery multiplication, which might allow remote attackers to conduct a timing side-channel attack and retrieve RSA private keys.
The RSA-CRT implementation in PolarSSL before 1.2.9 does not properly ...
The RSA-CRT implementation in PolarSSL before 1.2.9 does not properly perform Montgomery multiplication, which might allow remote attackers to conduct a timing side-channel attack and retrieve RSA private keys.
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
EPSS
4.3 Medium
CVSS2