CVE-2011-1945

Publication date 31 May 2011

Last updated 24 July 2024


Ubuntu priority

The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it easier for context-dependent attackers to determine private keys via a timing attack and a lattice calculation.

Read the notes from the security team

Status

Package Ubuntu Release Status
openssl 11.10 oneiric
Fixed 1.0.0e-2ubuntu1
11.04 natty
Fixed 0.9.8o-5ubuntu1.2
10.10 maverick
Fixed 0.9.8o-1ubuntu4.6
10.04 LTS lucid
Fixed 0.9.8k-7ubuntu8.8
8.04 LTS hardy
Fixed 0.9.8g-4ubuntu3.15

Notes


jdstrand

from upstream: "The OpenSSL team have reviewed the paper, and although the result is significant, we believe that the affected code (ECDSA used with binary curves) is very rarely used at present. We therefore do not plan on issuing a security release but expect to patch this in the future."

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
openssl

References

Related Ubuntu Security Notices (USN)

    • USN-1357-1
    • OpenSSL vulnerabilities
    • 9 February 2012

Other references