Cryptographic Issues

Affecting libgcrypt20 package, versions *

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

** DISPUTED ** In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack.

References

CVSS Score

5.9
low severity
  • Attack Vector
    Network
  • Attack Complexity
    High
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    None
  • Availability
    None
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE
CVE-2019-12904
CWE
CWE-310
Snyk ID
SNYK-UBUNTU1804-LIBGCRYPT20-455294
Disclosed
20 Jun, 2019
Published
23 Jun, 2019