[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2015-577 --- libgcrypt

ID: oval:org.secpod.oval:def:1200057Date: (C)2015-12-30   (M)2023-12-07
Class: PATCHFamily: unix




Fix a side-channel attack on data-dependent timing variations in modular exponentiation, which can potentially lead to an information leak. Fix a side-channel attack which can potentially lead to an information leak. Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576 , which was fixed in ALAS-2014-278

Platform:
Amazon Linux AMI
Product:
libgcrypt
Reference:
ALAS-2015-577
CVE-2015-0837
CVE-2014-5270
CVE-2014-3591
CVE    3
CVE-2014-3591
CVE-2014-5270
CVE-2015-0837
CPE    2
cpe:/o:amazon:linux
cpe:/a:libgcrypt:libgcrypt

© SecPod Technologies