Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4242

Опубликовано: 22 июл. 2013
Источник: redhat
CVSS2: 1.9
EPSS Низкий

Описание

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

Отчет

This issue affects the version of gnupg as shipped with Red Hat Enterprise Linux 5. This issue affects the version of libgcrypt as shipped with Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More technical details on this flaw are available at https://bugzilla.redhat.com/show_bug.cgi?id=988589#c12

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7libgcryptNot affected
Red Hat Enterprise Linux 5libgcryptFixedRHSA-2013:145724.10.2013
Red Hat Enterprise Linux 5gnupgFixedRHSA-2013:145824.10.2013
Red Hat Enterprise Linux 6libgcryptFixedRHSA-2013:145724.10.2013

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=988589GnuPG susceptible to Yarom/Falkner flush+reload cache side-channel attack

EPSS

Процентиль: 27%
0.0009
Низкий

1.9 Low

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

nvd
почти 12 лет назад

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

debian
почти 12 лет назад

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x ...

github
больше 3 лет назад

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

oracle-oval
почти 12 лет назад

ELSA-2013-1457: libgcrypt security update (MODERATE)

EPSS

Процентиль: 27%
0.0009
Низкий

1.9 Low

CVSS2