The MODEXPCTIMECOPYFROMPREBUF function in crypto/bn/bnexp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libssl1.0.0-udeb-dbgsym": "1.0.1f-1ubuntu2.18", "libssl-dev": "1.0.1f-1ubuntu2.18", "libssl1.0.0": "1.0.1f-1ubuntu2.18", "libssl-doc": "1.0.1f-1ubuntu2.18", "libcrypto1.0.0-udeb-dbgsym": "1.0.1f-1ubuntu2.18", "libssl1.0.0-dbg": "1.0.1f-1ubuntu2.18", "libssl-dev-dbgsym": "1.0.1f-1ubuntu2.18", "openssl": "1.0.1f-1ubuntu2.18", "openssl-dbgsym": "1.0.1f-1ubuntu2.18", "libssl1.0.0-udeb": "1.0.1f-1ubuntu2.18", "libssl1.0.0-dbgsym": "1.0.1f-1ubuntu2.18", "libcrypto1.0.0-udeb": "1.0.1f-1ubuntu2.18" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libssl1.0.0-udeb-dbgsym": "1.0.2g-1ubuntu2", "libssl-dev": "1.0.2g-1ubuntu2", "libssl1.0.0": "1.0.2g-1ubuntu2", "libssl-doc": "1.0.2g-1ubuntu2", "libcrypto1.0.0-udeb-dbgsym": "1.0.2g-1ubuntu2", "libssl1.0.0-dbg": "1.0.2g-1ubuntu2", "libssl-dev-dbgsym": "1.0.2g-1ubuntu2", "openssl": "1.0.2g-1ubuntu2", "openssl-dbgsym": "1.0.2g-1ubuntu2", "libssl1.0.0-udeb": "1.0.2g-1ubuntu2", "libssl1.0.0-dbgsym": "1.0.2g-1ubuntu2", "libcrypto1.0.0-udeb": "1.0.2g-1ubuntu2" } ] }