The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2908-1 | openssl security update |
EUVD |
EUVD-2014-0168 | The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack. |
Ubuntu USN |
USN-2165-1 | OpenSSL vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T09:05:37.865Z
Reserved: 2013-12-03T00:00:00
Link: CVE-2014-0076
No data.
Status : Deferred
Published: 2014-03-25T13:25:21.977
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-0076
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN