First published: Wed Jun 19 2019(Updated: )
** DISPUTED ** In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Libgcrypt | =1.8.4 | |
openSUSE | =15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12904 is a vulnerability in Libgcrypt 1.8.4, where the C implementation of AES is vulnerable to a flush-and-reload side-channel attack.
The severity of CVE-2019-12904 is medium with a severity value of 5.9.
Libgcrypt version 1.8.4 is affected by CVE-2019-12904, along with GnuPG Libgcrypt and openSUSE Leap 15.0.
Update GnuPG Libgcrypt to a version that is not vulnerable, and apply patches provided by the vendor if available.
You can find more information about CVE-2019-12904 on the following references: http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00049.html, https://dev.gnupg.org/T4541, https://github.com/gpg/libgcrypt/commit/a4c561aab1014c3630bc88faf6f5246fee16b020.