Description
Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-53-1 | gnupg security update |
Debian DLA |
DLA-93-1 | libgcrypt11 security update |
Debian DSA |
DSA-3024-1 | gnupg security update |
Debian DSA |
DSA-3073-1 | libgcrypt11 security update |
EUVD |
EUVD-2014-5163 | Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576. |
Ubuntu USN |
USN-2339-1 | GnuPG vulnerability |
Ubuntu USN |
USN-2339-2 | Libgcrypt vulnerability |
Ubuntu USN |
USN-2554-1 | GnuPG vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T11:41:47.780Z
Reserved: 2014-08-15T00:00:00.000Z
Link: CVE-2014-5270
No data.
Status : Deferred
Published: 2014-10-10T01:55:10.383
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-5270
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN