Описание
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack
[Disputed] A vulnerability has been identified in Libgcrypt due to a flaw in its C implementation of AES. This vulnerability enables a remote attacker to perform a flush-and-reload side-channel attack, potentially accessing sensitive information. The vulnerability arises from the availability of physical addresses to other processes, particularly on platforms lacking an assembly-language implementation.
Отчет
Please note that this issue is more theoretical than practical in terms of potential attack scenarios. The upstream developers have disputed this CVE, and the patches they supplied seem to focus more on hardening. Refer to external references for further details. Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-385: Covert Timing Channel vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. The platform enforces hardening guidelines to apply the most restrictive configurations necessary to meet operational requirements. Baseline settings and configuration controls ensure secure system and software configurations, while least functionality reduces the attack surface by limiting unnecessary system features and timing variations, thereby decreasing the risk of covert timing channels. Event logs are collected and processed for centralization, correlation, analysis, monitoring, alerting, and retention, supporting the detection of anomalous timing-based behavior that could indicate covert channel exploitation. Static code analysis and peer code reviews enforce robust input validation and error-handling practices, helping prevent unauthorized data transmission. Additionally, process isolation and encryption of data at rest limit the impact of successful exploitation by isolating compromised processes and preventing unauthorized data access or leakage across workloads.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | libgcrypt | Will not fix | ||
| Red Hat Enterprise Linux 6 | libgcrypt | Will not fix | ||
| Red Hat Enterprise Linux 7 | libgcrypt | Will not fix | ||
| Red Hat Enterprise Linux 8 | libgcrypt | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
5.9 Medium
CVSS3
Связанные уязвимости
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flu ...
EPSS
5.9 Medium
CVSS3