Количество 8
Количество 8
GHSA-w862-39x5-q88x
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.)
CVE-2019-12904
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack
CVE-2019-12904
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack
CVE-2019-12904
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack
CVE-2019-12904
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flu ...
openSUSE-SU-2019:1792-1
Security update for libgcrypt
SUSE-SU-2019:1971-1
Security update for libgcrypt
SUSE-SU-2019:1859-1
Security update for libgcrypt
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-w862-39x5-q88x In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) | CVSS3: 5.9 | 0% Низкий | больше 3 лет назад | |
CVE-2019-12904 In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack | CVSS3: 5.9 | 0% Низкий | больше 6 лет назад | |
CVE-2019-12904 In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack | CVSS3: 5.9 | 0% Низкий | больше 6 лет назад | |
CVE-2019-12904 In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack | CVSS3: 5.9 | 0% Низкий | больше 6 лет назад | |
CVE-2019-12904 In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flu ... | CVSS3: 5.9 | 0% Низкий | больше 6 лет назад | |
openSUSE-SU-2019:1792-1 Security update for libgcrypt | 0% Низкий | больше 6 лет назад | ||
SUSE-SU-2019:1971-1 Security update for libgcrypt | 0% Низкий | больше 6 лет назад | ||
SUSE-SU-2019:1859-1 Security update for libgcrypt | 0% Низкий | больше 6 лет назад |
Уязвимостей на страницу