Alejandro Cabrera Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis Manuel Alvarez Tapia discovered that OpenSSL incorrectly handled RSA key generation. An attacker could possibly use this issue to perform a cache-timing attack and recover private RSA keys.
{ "availability": "No subscription required", "binaries": [ { "libssl1.0.0-udeb-dbgsym": "1.0.1f-1ubuntu2.25", "libssl-dev": "1.0.1f-1ubuntu2.25", "libssl1.0.0": "1.0.1f-1ubuntu2.25", "libssl-doc": "1.0.1f-1ubuntu2.25", "libcrypto1.0.0-udeb-dbgsym": "1.0.1f-1ubuntu2.25", "libssl1.0.0-dbg": "1.0.1f-1ubuntu2.25", "libssl-dev-dbgsym": "1.0.1f-1ubuntu2.25", "openssl": "1.0.1f-1ubuntu2.25", "openssl-dbgsym": "1.0.1f-1ubuntu2.25", "libssl1.0.0-udeb": "1.0.1f-1ubuntu2.25", "libssl1.0.0-dbgsym": "1.0.1f-1ubuntu2.25", "libcrypto1.0.0-udeb": "1.0.1f-1ubuntu2.25" } ] }
{ "availability": "No subscription required", "binaries": [ { "libssl1.0.0-udeb-dbgsym": "1.0.2g-1ubuntu4.12", "libssl-dev": "1.0.2g-1ubuntu4.12", "libssl1.0.0": "1.0.2g-1ubuntu4.12", "libssl-doc": "1.0.2g-1ubuntu4.12", "libcrypto1.0.0-udeb-dbgsym": "1.0.2g-1ubuntu4.12", "libssl1.0.0-dbg": "1.0.2g-1ubuntu4.12", "libssl-dev-dbgsym": "1.0.2g-1ubuntu4.12", "openssl": "1.0.2g-1ubuntu4.12", "openssl-dbgsym": "1.0.2g-1ubuntu4.12", "libssl1.0.0-udeb": "1.0.2g-1ubuntu4.12", "libssl1.0.0-dbgsym": "1.0.2g-1ubuntu4.12", "libcrypto1.0.0-udeb": "1.0.2g-1ubuntu4.12" } ] }