ALPINE-CVE-2019-12904 PUBLISHED CVSS 5.900000095367432 MEDIUM

In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor's position is that the issue report cannot be validated because there is no description of an attack

Risk Scores

CVSS v3.1
5.900000095367432
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products

VendorProductVersions
Alpine:v3.16libgcrypt1.7.8-r0, 1.7.7-r0, 1.7.6-r0
Alpine:v3.15libgcrypt1.7.6-r0, 1.7.5-r0, 1.7.3-r0
Alpine:v3.20libgcrypt1.4.5-r2, 1.4.6-r0, 1.4.6-r1
Alpine:v3.8libgcrypt1.4.6-r0, 1.8.3-r0, 1.8.2-r0
Alpine:v3.21libgcrypt1.8.3-r0, 1.8.4-r0, 1.8.4-r1
Alpine:v3.12libgcrypt1.7.3-r0, 1.8.4-r1, 1.8.4-r0
Alpine:v3.9libgcrypt0, 1.4.3-r0, 1.4.4-r0
Alpine:v3.7libgcrypt1.7.3-r0, 0, 1.4.3-r0
Alpine:v3.18libgcrypt1.4.5-r2, 1.4.6-r0, 1.4.6-r1
Alpine:v3.14libgcrypt1.8.4-r0, 1.8.2-r0, 1.8.1-r0
Alpine:v3.11libgcrypt1.5.0-r0, 1.5.1-r0, 1.5.2-r0
Alpine:v3.17libgcrypt1.4.5-r1, 1.4.6-r0, 1.4.6-r1
Alpine:v3.22libgcrypt1.4.5-r2, 1.4.6-r0, 1.4.6-r1
Alpine:v3.19libgcrypt1.8.1-r0, 1.8.4-r1, 1.8.4-r0
Alpine:v3.10libgcrypt1.7.6-r0, 1.7.5-r0, 1.7.3-r0
Alpine:v3.13libgcrypt1.8.4-r0, 1.8.2-r0, 1.8.1-r0
Alpine:v3.23libgcrypt1.8.0-r0, 1.7.8-r0, 1.7.7-r0

Timeline

References

Open in Interactive Console →