CVE-2015-0837

Published: 02 March 2015

The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."

Priority

Low

CVSS 3 base score: 5.9

Status

Package Release Status
gnupg
Launchpad, Ubuntu, Debian
Upstream
Released (1.4.18-7)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1.4.16-1ubuntu2.3)
Patches:
Upstream: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commitdiff;h=6cbc75e71295f23431c4ab95edc7573f2fc28476
libgcrypt11
Launchpad, Ubuntu, Debian
Upstream Needed

Ubuntu 14.04 ESM (Trusty Tahr)
Released (1.5.3-2ubuntu4.2)
libgcrypt20
Launchpad, Ubuntu, Debian
Upstream
Released (1.6.3-2)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [1.6.1-2ubuntu1.14.04.1])
Patches:
Upstream: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=deb6f231ba85f65283c9e1deb3e2dea3b6ca46dc
Upstream: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=d9f002899d26dc64f1502ae5050632340a4780fe
Upstream: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=5e72b6c76ebee720f69b8a5c212f52d38eb50287