CVE-2014-0076

The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.

Published date
2014-03-25T13:25Z
Last modification date
2023-02-13T00:31Z
Assigner
secalert@redhat.com
Problem type
CWE-310
NameURLSourceTags
https://bugzilla.novell.com/show_bug.cgi?id=869945https://bugzilla.novell.com/show_bug.cgi?id=869945CONFIRM
http://eprint.iacr.org/2014/140http://eprint.iacr.org/2014/140MISC
https://bugs.gentoo.org/show_bug.cgi?id=505278https://bugs.gentoo.org/show_bug.cgi?id=505278CONFIRM
http://www.openssl.org/news/secadv_20140605.txthttp://www.openssl.org/news/secadv_20140605.txtCONFIRM
20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Productshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-opensslCISCO
http://www-01.ibm.com/support/docview.wss?uid=swg21676035http://www-01.ibm.com/support/docview.wss?uid=swg21676035CONFIRM
59438http://secunia.com/advisories/59438SECUNIA
http://advisories.mageia.org/MGASA-2014-0165.htmlhttp://advisories.mageia.org/MGASA-2014-0165.htmlCONFIRM
59450http://secunia.com/advisories/59450SECUNIA
59721http://secunia.com/advisories/59721SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21677695http://www-01.ibm.com/support/docview.wss?uid=swg21677695CONFIRM
59655http://secunia.com/advisories/59655SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21676655http://www-01.ibm.com/support/docview.wss?uid=swg21676655CONFIRM
59162http://secunia.com/advisories/59162SECUNIA
58939http://secunia.com/advisories/58939SECUNIA
MDVSA-2014:067http://www.mandriva.com/security/advisories?name=MDVSA-2014:067MANDRIVA
http://www-01.ibm.com/support/docview.wss?uid=swg21677828http://www-01.ibm.com/support/docview.wss?uid=swg21677828CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21676424http://www-01.ibm.com/support/docview.wss?uid=swg21676424CONFIRM
59490http://secunia.com/advisories/59490SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21676062http://www-01.ibm.com/support/docview.wss?uid=swg21676062CONFIRM
58727http://secunia.com/advisories/58727SECUNIA
https://kc.mcafee.com/corporate/index?page=content&id=SB10075https://kc.mcafee.com/corporate/index?page=content&id=SB10075CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21676419http://www-01.ibm.com/support/docview.wss?uid=swg21676419CONFIRM
http://www.novell.com/support/kb/doc.php?id=7015300http://www.novell.com/support/kb/doc.php?id=7015300CONFIRM
http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htmhttp://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htmCONFIRM
66363http://www.securityfocus.com/bid/66363BID
http://www-01.ibm.com/support/docview.wss?uid=swg21673137http://www-01.ibm.com/support/docview.wss?uid=swg21673137CONFIRM
59514http://secunia.com/advisories/59514SECUNIA
59495http://secunia.com/advisories/59495SECUNIA
59413http://secunia.com/advisories/59413SECUNIA
http://www.novell.com/support/kb/doc.php?id=7015264http://www.novell.com/support/kb/doc.php?id=7015264CONFIRM
59300http://secunia.com/advisories/59300SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=isg400001843http://www-01.ibm.com/support/docview.wss?uid=isg400001843CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=isg400001841http://www-01.ibm.com/support/docview.wss?uid=isg400001841CONFIRM
60571http://secunia.com/advisories/60571SECUNIA
http://support.apple.com/kb/HT6443http://support.apple.com/kb/HT6443CONFIRM
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlhttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlCONFIRM
MDVSA-2015:062http://www.mandriva.com/security/advisories?name=MDVSA-2015:062MANDRIVA
http://www-01.ibm.com/support/docview.wss?uid=swg21676092http://www-01.ibm.com/support/docview.wss?uid=swg21676092CONFIRM
SSRT101590http://marc.info/?l=bugtraq&m=140266410314613&w=2HP
HPSBMU03051http://marc.info/?l=bugtraq&m=140448122410568&w=2HP
HPSBMU03074http://marc.info/?l=bugtraq&m=140621259019789&w=2HP
HPSBGN03050http://marc.info/?l=bugtraq&m=140482916501310&w=2HP
HPSBMU03057http://marc.info/?l=bugtraq&m=140389274407904&w=2HP
HPSBOV03047http://marc.info/?l=bugtraq&m=140317760000786&w=2HP
HPSBMU03076http://marc.info/?l=bugtraq&m=140904544427729&w=2HP
HPSBMU03056http://marc.info/?l=bugtraq&m=140389355508263&w=2HP
HPSBMU03062http://marc.info/?l=bugtraq&m=140752315422991&w=2HP
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946CONFIRM
openSUSE-SU-2016:0640http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.htmlSUSE
http://www-01.ibm.com/support/docview.wss?uid=swg21676501http://www-01.ibm.com/support/docview.wss?uid=swg21676501CONFIRM
59454http://secunia.com/advisories/59454SECUNIA
59445http://secunia.com/advisories/59445SECUNIA
59374http://secunia.com/advisories/59374SECUNIA
59364http://secunia.com/advisories/59364SECUNIA
59264http://secunia.com/advisories/59264SECUNIA
59175http://secunia.com/advisories/59175SECUNIA
59040http://secunia.com/advisories/59040SECUNIA
58492http://secunia.com/advisories/58492SECUNIA
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629CONFIRM
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlCONFIRM
USN-2165-1http://www.ubuntu.com/usn/USN-2165-1UBUNTU
openSUSE-SU-2014:0480http://lists.opensuse.org/opensuse-updates/2014-04/msg00007.htmlSUSE
http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2198be3483259de374f91e57d247d0fc667aef29http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2198be3483259de374f91e57d247d0fc667aef29MISC