Описание
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
Релиз | Статус | Примечание |
---|---|---|
artful | released | 1.0.2g-1ubuntu2 |
bionic | released | 1.0.2g-1ubuntu2 |
cosmic | released | 1.0.2g-1ubuntu2 |
devel | released | 1.0.2g-1ubuntu2 |
disco | released | 1.0.2g-1ubuntu2 |
esm-infra-legacy/trusty | not-affected | 1.0.1f-1ubuntu2.18 |
esm-infra/bionic | not-affected | 1.0.2g-1ubuntu2 |
esm-infra/xenial | not-affected | 1.0.2g-1ubuntu2 |
precise | released | 1.0.1-4ubuntu5.35 |
precise/esm | not-affected | 1.0.1-4ubuntu5.35 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
artful | DNE | |
bionic | DNE | |
cosmic | DNE | |
devel | DNE | |
disco | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
precise | ignored | end of life |
precise/esm | DNE | precise was needed |
trusty | ignored | end of standard support |
trusty/esm | DNE | trusty was needed |
Показывать по
1.9 Low
CVSS2
5.1 Medium
CVSS3
Связанные уязвимости
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in O ...
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
Уязвимость библиотеки OpenSSL, позволяющая нарушителю раскрыть RSA-ключи
1.9 Low
CVSS2
5.1 Medium
CVSS3