The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
http://www.debian.org/security/2015/dsa-3184 | third party advisory |
http://www.debian.org/security/2015/dsa-3185 | third party advisory |
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html | mailing list vendor advisory |
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html | mailing list vendor advisory |
https://ieeexplore.ieee.org/document/7163050 | third party advisory |