The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-175-1 | gnupg security update |
![]() |
DLA-190-1 | libgcrypt11 security update |
![]() |
DSA-3184-1 | gnupg security update |
![]() |
DSA-3185-1 | libgcrypt11 security update |
![]() |
EUVD-2015-0850 | The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack." |
![]() |
USN-2554-1 | GnuPG vulnerabilities |
![]() |
USN-2555-1 | Libgcrypt vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-06T04:26:11.067Z
Reserved: 2015-01-07T00:00:00
Link: CVE-2015-0837

No data.

Status : Modified
Published: 2019-11-29T22:15:11.783
Modified: 2024-11-21T02:23:49.950
Link: CVE-2015-0837


No data.