CVE-2014-3570

Published: 08 January 2015

The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.

Priority

Low

Status

Package Release Status
openssl
Launchpad, Ubuntu, Debian
Upstream
Released (0.9.8zd, 1.0.1k)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.0.1f-1ubuntu10)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (1.0.1f-1ubuntu10)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1.0.1f-1ubuntu2.8)
Patches:
Upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=e078642ddea29bbb6ba29788a6a513796387fbbb (1.0.1)
Upstream: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=4b4c0a19211bf73d81de52de697a1a9dc60aed82 (0.9.8)
openssl098
Launchpad, Ubuntu, Debian
Upstream
Released (0.9.8zd, 1.0.1k)
Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 ESM (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)