The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation128 reference(s) from NVD