Описание
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 1.4.14-1ubuntu1 |
lucid | released | 1.4.10-2ubuntu1.3 |
precise | released | 1.4.11-3ubuntu2.3 |
quantal | released | 1.4.11-3ubuntu4.2 |
raring | released | 1.4.12-7ubuntu1.1 |
upstream | released | 1.4.14-1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | released | 1.5.0-3ubuntu3 |
lucid | released | 1.4.4-5ubuntu2.2 |
precise | released | 1.5.0-3ubuntu0.2 |
quantal | released | 1.5.0-3ubuntu1.1 |
raring | released | 1.5.0-3ubuntu2.2 |
upstream | released | 1.5.3-1 |
Показывать по
EPSS
1.9 Low
CVSS2
Связанные уязвимости
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x ...
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
EPSS
1.9 Low
CVSS2