First published: Fri Oct 10 2014(Updated: )
Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GnuPG Libgcrypt | <=1.5.3 | |
GnuPG Libgcrypt | =1.4.0 | |
GnuPG Libgcrypt | =1.4.3 | |
GnuPG Libgcrypt | =1.4.4 | |
GnuPG Libgcrypt | =1.4.5 | |
GnuPG Libgcrypt | =1.4.6 | |
GnuPG Libgcrypt | =1.5.0 | |
GnuPG Libgcrypt | =1.5.1 | |
GnuPG Libgcrypt | =1.5.2 | |
Debian Debian Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.