Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2015-0837

Published: 2 March 2015

The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."

Priority

Low

CVSS 3 base score: 5.9

Status

Package Release Status
gnupg
Launchpad, Ubuntu, Debian
lucid
Released (1.4.10-2ubuntu1.8)
precise
Released (1.4.11-3ubuntu2.9)
trusty
Released (1.4.16-1ubuntu2.3)
upstream
Released (1.4.18-7)
utopic
Released (1.4.16-1.2ubuntu1.2)
Patches:
upstream: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff;h=6cbc75e71295f23431c4ab95edc7573f2fc28476



libgcrypt11
Launchpad, Ubuntu, Debian
lucid
Released (1.4.4-5ubuntu2.4)
precise
Released (1.5.0-3ubuntu0.4)
trusty
Released (1.5.3-2ubuntu4.2)
upstream Needed

utopic
Released (1.5.4-2ubuntu1.1)
libgcrypt20
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist
(trusty was released [1.6.1-2ubuntu1.14.04.1])
upstream
Released (1.6.3-2)
utopic
Released (1.6.1-2ubuntu1.14.10.1)
Patches:

upstream: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=deb6f231ba85f65283c9e1deb3e2dea3b6ca46dc
upstream: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=d9f002899d26dc64f1502ae5050632340a4780fe
upstream: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=5e72b6c76ebee720f69b8a5c212f52d38eb50287