CVE-2019-12904

** DISPUTED ** In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnupg:libgcrypt:1.8.4:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-06-20 00:15

Updated : 2024-05-14 05:39


NVD link : CVE-2019-12904

Mitre link : CVE-2019-12904

CVE.ORG link : CVE-2019-12904


JSON object : View

Products Affected

gnupg

  • libgcrypt

opensuse

  • leap
CWE
CWE-668

Exposure of Resource to Wrong Sphere