CVE-2019-12904
Summary
| CVE | CVE-2019-12904 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-06-20 00:15:00 UTC |
| Updated | 2023-11-07 03:03:00 UTC |
| Description | ** DISPUTED ** In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack. |
Risk And Classification
Problem Types: CWE-668
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Pony Mail! | MLIST | lists.apache.org | Mailing List, Third Party Advisory |
| GCM: move look-up table to .data section and unshare between processes · gpg/libgcrypt@a4c561a · GitHub | MISC | github.com | Patch, Third Party Advisory |
| [security-announce] openSUSE-SU-2019:1792-1: moderate: Security update f | SUSE | lists.opensuse.org | Mailing List, Third Party Advisory |
| AES: move look-up tables to .data section and unshare between processes · gpg/libgcrypt@daedbbb · GitHub | MISC | github.com | Patch, Third Party Advisory |
| [mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar | lists.apache.org | ||
| ⚓ T4541 C implementation of AES is vulnerable to side-channel attacks | MISC | dev.gnupg.org | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.