Name | CVE-2014-5270 |
Description | Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-54-1, DLA-93-1, DSA-3024-1, DSA-3073-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
gnupg (PTS) | jessie, jessie (lts) | 1.4.18-7+deb8u5 | fixed |
libgcrypt20 (PTS) | jessie, jessie (lts) | 1.6.3-2+deb8u9 | fixed |
stretch (security), stretch (lts), stretch | 1.7.6-2+deb9u4 | fixed | |
buster | 1.8.4-5+deb10u1 | fixed | |
bullseye | 1.8.7-6 | fixed | |
bookworm | 1.10.1-3 | fixed | |
sid, trixie | 1.11.0-6 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
gnupg | source | squeeze | 1.4.10-4+squeeze6 | DLA-54-1 | ||
gnupg | source | wheezy | 1.4.12-7+deb7u6 | DSA-3024-1 | ||
gnupg | source | (unstable) | 1.4.16-1 | |||
libgcrypt11 | source | squeeze | 1.4.5-2+squeeze2 | DLA-93-1 | ||
libgcrypt11 | source | wheezy | 1.5.0-5+deb7u2 | DSA-3073-1 | ||
libgcrypt11 | source | (unstable) | 1.5.4-1 | |||
libgcrypt20 | source | (unstable) | 1.6.0-2 |
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=cad8216f9a0b33c9dc84ecc4f385b00045e7b496
http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html