CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
5.3%
Yuval Yarom and Katrina Falkner discovered a timing-based information leak,
known as Flush+Reload, that could be used to trace execution in programs.
GnuPG and Libgcrypt followed different execution paths based on key-related
data, which could be used to expose the contents of private keys.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 13.04 | noarch | libgcrypt11 | < 1.5.0-3ubuntu2.2 | UNKNOWN |
Ubuntu | 13.04 | noarch | libgcrypt11-dbg | < 1.5.0-3ubuntu2.2 | UNKNOWN |
Ubuntu | 13.04 | noarch | libgcrypt11-dev | < 1.5.0-3ubuntu2.2 | UNKNOWN |
Ubuntu | 13.04 | noarch | libgcrypt11-udeb | < 1.5.0-3ubuntu2.2 | UNKNOWN |
Ubuntu | 13.04 | noarch | gnupg | < 1.4.12-7ubuntu1.1 | UNKNOWN |
Ubuntu | 13.04 | noarch | gnupg-curl | < 1.4.12-7ubuntu1.1 | UNKNOWN |
Ubuntu | 13.04 | noarch | gnupg-udeb | < 1.4.12-7ubuntu1.1 | UNKNOWN |
Ubuntu | 13.04 | noarch | gpgv | < 1.4.12-7ubuntu1.1 | UNKNOWN |
Ubuntu | 13.04 | noarch | gpgv-udeb | < 1.4.12-7ubuntu1.1 | UNKNOWN |
Ubuntu | 12.10 | noarch | libgcrypt11 | < 1.5.0-3ubuntu1.1 | UNKNOWN |