Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4242

Опубликовано: 19 авг. 2013
Источник: debian
EPSS Низкий

Описание

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnupgfixed1.4.14-1package
libgcrypt11fixed1.5.3-1package

EPSS

Процентиль: 27%
0.0009
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

redhat
около 12 лет назад

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

nvd
почти 12 лет назад

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

github
больше 3 лет назад

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

oracle-oval
почти 12 лет назад

ELSA-2013-1457: libgcrypt security update (MODERATE)

EPSS

Процентиль: 27%
0.0009
Низкий