A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.
{
"binaries": [
{
"binary_name": "libcrypto1.0.0-udeb",
"binary_version": "1.0.1f-1ubuntu2.22"
},
{
"binary_name": "libcrypto1.0.0-udeb-dbgsym",
"binary_version": "1.0.1f-1ubuntu2.22"
},
{
"binary_name": "libssl-dev",
"binary_version": "1.0.1f-1ubuntu2.22"
},
{
"binary_name": "libssl-dev-dbgsym",
"binary_version": "1.0.1f-1ubuntu2.22"
},
{
"binary_name": "libssl-doc",
"binary_version": "1.0.1f-1ubuntu2.22"
},
{
"binary_name": "libssl1.0.0",
"binary_version": "1.0.1f-1ubuntu2.22"
},
{
"binary_name": "libssl1.0.0-dbg",
"binary_version": "1.0.1f-1ubuntu2.22"
},
{
"binary_name": "libssl1.0.0-dbgsym",
"binary_version": "1.0.1f-1ubuntu2.22"
},
{
"binary_name": "libssl1.0.0-udeb",
"binary_version": "1.0.1f-1ubuntu2.22"
},
{
"binary_name": "libssl1.0.0-udeb-dbgsym",
"binary_version": "1.0.1f-1ubuntu2.22"
},
{
"binary_name": "openssl",
"binary_version": "1.0.1f-1ubuntu2.22"
},
{
"binary_name": "openssl-dbgsym",
"binary_version": "1.0.1f-1ubuntu2.22"
}
],
"availability": "No subscription required"
}