Количество 25
Количество 25
CVE-2016-0702
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
CVE-2016-0702
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
CVE-2016-0702
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
CVE-2016-0702
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in O ...
GHSA-q7xg-gmg7-59f4
The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
BDU:2016-00630
Уязвимость библиотеки OpenSSL, позволяющая нарушителю раскрыть RSA-ключи
openSUSE-SU-2017:1212-1
Security update for libressl
openSUSE-SU-2017:1211-1
Security update for libressl
openSUSE-SU-2016:1566-1
Security update for nodejs
openSUSE-SU-2016:1273-1
Security update for compat-openssl098
openSUSE-SU-2016:1242-1
Security update for libopenssl0_9_8
SUSE-SU-2016:1290-1
Security update for openssl
SUSE-SU-2016:1267-1
Security update for compat-openssl098
ELSA-2016-0301
ELSA-2016-0301: openssl security update (IMPORTANT)
SUSE-SU-2016:0631-1
Security update for compat-openssl097g
openSUSE-SU-2016:0720-1
Security update for openssl
SUSE-SU-2016:0641-1
Security update for openssl
SUSE-SU-2016:0624-1
Security update for openssl
openSUSE-SU-2016:0628-1
Security update for openssl
SUSE-SU-2016:0621-1
Security update for openssl
Уязвимостей на страницу
Уязвимость  | CVSS  | EPSS  | Опубликовано  | |
|---|---|---|---|---|
CVE-2016-0702 The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.  | CVSS3: 5.1  | 2% Низкий | больше 9 лет назад | |
CVE-2016-0702 The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.  | CVSS2: 2.6  | 2% Низкий | больше 9 лет назад | |
CVE-2016-0702 The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.  | CVSS3: 5.1  | 2% Низкий | больше 9 лет назад | |
CVE-2016-0702 The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in O ...  | CVSS3: 5.1  | 2% Низкий | больше 9 лет назад | |
GHSA-q7xg-gmg7-59f4 The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.  | CVSS3: 5.1  | 2% Низкий | больше 3 лет назад | |
BDU:2016-00630 Уязвимость библиотеки OpenSSL, позволяющая нарушителю раскрыть RSA-ключи  | CVSS2: 1.9  | 2% Низкий | больше 9 лет назад | |
openSUSE-SU-2017:1212-1 Security update for libressl  | больше 8 лет назад | |||
openSUSE-SU-2017:1211-1 Security update for libressl  | больше 8 лет назад | |||
openSUSE-SU-2016:1566-1 Security update for nodejs  | больше 9 лет назад | |||
openSUSE-SU-2016:1273-1 Security update for compat-openssl098  | больше 9 лет назад | |||
openSUSE-SU-2016:1242-1 Security update for libopenssl0_9_8  | больше 9 лет назад | |||
SUSE-SU-2016:1290-1 Security update for openssl  | больше 9 лет назад | |||
SUSE-SU-2016:1267-1 Security update for compat-openssl098  | больше 9 лет назад | |||
ELSA-2016-0301 ELSA-2016-0301: openssl security update (IMPORTANT)  | больше 9 лет назад | |||
SUSE-SU-2016:0631-1 Security update for compat-openssl097g  | больше 9 лет назад | |||
openSUSE-SU-2016:0720-1 Security update for openssl  | больше 9 лет назад | |||
SUSE-SU-2016:0641-1 Security update for openssl  | больше 9 лет назад | |||
SUSE-SU-2016:0624-1 Security update for openssl  | больше 9 лет назад | |||
openSUSE-SU-2016:0628-1 Security update for openssl  | больше 9 лет назад | |||
SUSE-SU-2016:0621-1 Security update for openssl  | больше 9 лет назад | 
Уязвимостей на страницу