Do your applications use this vulnerable package?
Test your applications
Overview
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.)
References
CVSS Score
5.9
medium severity
-
Attack VectorNetwork
-
Attack ComplexityHigh
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityHigh
-
IntegrityNone
-
AvailabilityNone
- CVE
- CVE-2019-12904
- CWE
- CWE-310
- Snyk ID
- SNYK-DEBIAN10-LIBGCRYPT20-450771
- Disclosed
- 20 Jun, 2019
- Published
- 23 Jun, 2019