CVE-2015-0837

Publication date 2 March 2015

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

5.9 · Medium

Score breakdown

The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."

Status

Package Ubuntu Release Status
gnupg 14.10 utopic
Fixed 1.4.16-1.2ubuntu1.2
14.04 LTS trusty
Fixed 1.4.16-1ubuntu2.3
12.04 LTS precise
Fixed 1.4.11-3ubuntu2.9
10.04 LTS lucid
Fixed 1.4.10-2ubuntu1.8
libgcrypt11 14.10 utopic
Fixed 1.5.4-2ubuntu1.1
14.04 LTS trusty
Fixed 1.5.3-2ubuntu4.2
12.04 LTS precise
Fixed 1.5.0-3ubuntu0.4
10.04 LTS lucid
Fixed 1.4.4-5ubuntu2.4
libgcrypt20 14.10 utopic
Fixed 1.6.1-2ubuntu1.14.10.1
14.04 LTS trusty
Fixed 1.6.1-2ubuntu1.14.04.1
12.04 LTS precise Not in release
10.04 LTS lucid Not in release

Severity score breakdown

Parameter Value
Base score 5.9 · Medium
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

References

Related Ubuntu Security Notices (USN)

Other references