Cryptographic Issues The advisory has been revoked - it doesn't affect any version of package libgcrypt20 Open this link in a new tab
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-LIBGCRYPT20-450775
- published 23 Jun 2019
- disclosed 20 Jun 2019
Introduced: 20 Jun 2019
CVE-2019-12904 Open this link in a new tabAmendment
The Debian
security team deemed this advisory irrelevant for Debian:9
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcrypt20
package and not the libgcrypt20
package as distributed by Debian
.
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack