Количество 24
Количество 24
GHSA-rj52-j648-hww8
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVE-2018-0737
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVE-2018-0737
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVE-2018-0737
The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).
CVE-2018-0737
The OpenSSL RSA Key generation algorithm has been shown to be vulnerab ...

openSUSE-SU-2019:0152-1
Security update for openssl-1_1

openSUSE-SU-2018:2957-1
Security update for openssl

SUSE-SU-2019:0197-1
Security update for openssl-1_1

SUSE-SU-2018:2928-2
Security update for openssl

SUSE-SU-2018:2928-1
Security update for openssl

SUSE-SU-2018:2492-1
Security update for openssl

SUSE-SU-2018:2486-1
Security update for openssl

BDU:2019-00021
Уязвимость алгоритма генерации RSA-ключа библиотеки OpenSSL, позволяющая нарушителю восстановить закрытый ключ

openSUSE-SU-2018:3015-1
Security update for openssl-1_0_0

SUSE-SU-2018:2965-1
Security update for openssl-1_0_0

SUSE-SU-2018:2545-1
Security update for openssl1
ELSA-2018-4249
ELSA-2018-4249: openssl security update (IMPORTANT)
ELSA-2018-4248
ELSA-2018-4248: openssl security update (IMPORTANT)

openSUSE-SU-2018:2695-1
Security update for compat-openssl098

SUSE-SU-2018:2683-1
Security update for compat-openssl098
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-rj52-j648-hww8 The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o). | CVSS3: 5.9 | 28% Средний | около 3 лет назад | |
![]() | CVE-2018-0737 The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o). | CVSS3: 5.9 | 28% Средний | около 7 лет назад |
![]() | CVE-2018-0737 The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o). | CVSS3: 3.3 | 28% Средний | около 7 лет назад |
![]() | CVE-2018-0737 The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o). | CVSS3: 5.9 | 28% Средний | около 7 лет назад |
CVE-2018-0737 The OpenSSL RSA Key generation algorithm has been shown to be vulnerab ... | CVSS3: 5.9 | 28% Средний | около 7 лет назад | |
![]() | openSUSE-SU-2019:0152-1 Security update for openssl-1_1 | 28% Средний | около 6 лет назад | |
![]() | openSUSE-SU-2018:2957-1 Security update for openssl | 28% Средний | больше 6 лет назад | |
![]() | SUSE-SU-2019:0197-1 Security update for openssl-1_1 | 28% Средний | больше 6 лет назад | |
![]() | SUSE-SU-2018:2928-2 Security update for openssl | 28% Средний | больше 6 лет назад | |
![]() | SUSE-SU-2018:2928-1 Security update for openssl | 28% Средний | больше 6 лет назад | |
![]() | SUSE-SU-2018:2492-1 Security update for openssl | 28% Средний | почти 7 лет назад | |
![]() | SUSE-SU-2018:2486-1 Security update for openssl | 28% Средний | почти 7 лет назад | |
![]() | BDU:2019-00021 Уязвимость алгоритма генерации RSA-ключа библиотеки OpenSSL, позволяющая нарушителю восстановить закрытый ключ | CVSS3: 5.9 | 28% Средний | около 7 лет назад |
![]() | openSUSE-SU-2018:3015-1 Security update for openssl-1_0_0 | больше 6 лет назад | ||
![]() | SUSE-SU-2018:2965-1 Security update for openssl-1_0_0 | больше 6 лет назад | ||
![]() | SUSE-SU-2018:2545-1 Security update for openssl1 | почти 7 лет назад | ||
ELSA-2018-4249 ELSA-2018-4249: openssl security update (IMPORTANT) | больше 6 лет назад | |||
ELSA-2018-4248 ELSA-2018-4248: openssl security update (IMPORTANT) | больше 6 лет назад | |||
![]() | openSUSE-SU-2018:2695-1 Security update for compat-openssl098 | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2683-1 Security update for compat-openssl098 | почти 7 лет назад |
Уязвимостей на страницу