The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Information
Published : 2016-06-19 18:59
Updated : 2022-12-13 04:15
NVD link : CVE-2016-2178
Mitre link : CVE-2016-2178
JSON object : View
CWE
CWE-203
Observable Discrepancy
Products Affected
nodejs
- node.js
suse
- linux_enterprise
openssl
- openssl
canonical
- ubuntu_linux
debian
- debian_linux
oracle
- linux
- solaris