Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rpp2-q7rq-p78j

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

EPSS

Процентиль: 37%
0.00157
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
около 12 лет назад

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

redhat
больше 12 лет назад

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

nvd
около 12 лет назад

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

debian
около 12 лет назад

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x ...

oracle-oval
около 12 лет назад

ELSA-2013-1457: libgcrypt security update (MODERATE)

EPSS

Процентиль: 37%
0.00157
Низкий

Дефекты

CWE-200