The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T09:05:37.865Z
Reserved: 2013-12-03T00:00:00
Link: CVE-2014-0076

No data.

Status : Modified
Published: 2014-03-25T13:25:21.977
Modified: 2024-11-21T02:01:18.587
Link: CVE-2014-0076
