Описание
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).
| Релиз | Статус | Примечание | 
|---|---|---|
| bionic | released  | 1.1.0g-2ubuntu4.3 | 
| cosmic | released  | 1.1.1-1ubuntu2.1 | 
| devel | released  | 1.1.1a-1ubuntu2 | 
| disco | released  | 1.1.1a-1ubuntu2 | 
| eoan | released  | 1.1.1a-1ubuntu2 | 
| esm-infra-legacy/trusty | not-affected  | 1.0.1f-1ubuntu2.26 | 
| esm-infra/bionic | released  | 1.1.0g-2ubuntu4.3 | 
| esm-infra/focal | released  | 1.1.1a-1ubuntu2 | 
| esm-infra/xenial | not-affected  | 1.0.2g-1ubuntu4.13 | 
| focal | released  | 1.1.1a-1ubuntu2 | 
Показывать по
| Релиз | Статус | Примечание | 
|---|---|---|
| bionic | DNE  | |
| cosmic | DNE  | |
| devel | DNE  | |
| disco | DNE  | |
| eoan | DNE  | |
| esm-infra-legacy/trusty | DNE  | trusty/esm was DNE [trusty was needs-triage] | 
| esm-infra/focal | DNE  | |
| focal | DNE  | |
| groovy | DNE  | |
| hirsute | DNE  | 
Показывать по
| Релиз | Статус | Примечание | 
|---|---|---|
| bionic | not-affected  | 1.0.2n-1ubuntu5.1 | 
| cosmic | not-affected  | 1.0.2n-1ubuntu6 | 
| devel | DNE  | |
| disco | DNE  | |
| eoan | DNE  | |
| esm-infra-legacy/trusty | DNE  | |
| esm-infra/bionic | not-affected  | 1.0.2n-1ubuntu5.1 | 
| esm-infra/focal | DNE  | |
| focal | DNE  | |
| groovy | DNE  | 
Показывать по
EPSS
4.3 Medium
CVSS2
5.9 Medium
CVSS3
Связанные уязвимости
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable ...
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).
Уязвимость реализации алгоритма шифрования ECDSA библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
EPSS
4.3 Medium
CVSS2
5.9 Medium
CVSS3