The libgcrypt library provides general-purpose implementations of various
cryptographic algorithms.
It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload
cache side-channel attack on the RSA secret exponent. An attacker able to
execute a process on the logical CPU that shared the L3 cache with the
GnuPG process (such as a different local user or a user of a KVM guest
running on the same host with the kernel same-page merging functionality
enabled) could possibly use this flaw to obtain portions of the RSA secret
key. (CVE-2013-4242)
All libgcrypt users are advised to upgrade to this updated package, which
contains a backported patch to correct this issue.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 6 | i686 | libgcrypt | < 1.4.5-11.el6_4 | libgcrypt-1.4.5-11.el6_4.i686.rpm |
RedHat | 6 | ppc64 | libgcrypt | < 1.4.5-11.el6_4 | libgcrypt-1.4.5-11.el6_4.ppc64.rpm |
RedHat | 5 | s390 | libgcrypt-debuginfo | < 1.4.4-7.el5_10 | libgcrypt-debuginfo-1.4.4-7.el5_10.s390.rpm |
RedHat | 5 | ppc | libgcrypt | < 1.4.4-7.el5_10 | libgcrypt-1.4.4-7.el5_10.ppc.rpm |
RedHat | 5 | i386 | libgcrypt-debuginfo | < 1.4.4-7.el5_10 | libgcrypt-debuginfo-1.4.4-7.el5_10.i386.rpm |
RedHat | 5 | x86_64 | libgcrypt-devel | < 1.4.4-7.el5_10 | libgcrypt-devel-1.4.4-7.el5_10.x86_64.rpm |
RedHat | 6 | i686 | libgcrypt-devel | < 1.4.5-11.el6_4 | libgcrypt-devel-1.4.5-11.el6_4.i686.rpm |
RedHat | 5 | ia64 | libgcrypt-devel | < 1.4.4-7.el5_10 | libgcrypt-devel-1.4.4-7.el5_10.ia64.rpm |
RedHat | 5 | ia64 | libgcrypt-debuginfo | < 1.4.4-7.el5_10 | libgcrypt-debuginfo-1.4.4-7.el5_10.ia64.rpm |
RedHat | 5 | s390 | libgcrypt | < 1.4.4-7.el5_10 | libgcrypt-1.4.4-7.el5_10.s390.rpm |