cvelist/2015/0xxx/CVE-2015-0837.json
2019-11-29 22:00:58 +00:00

92 lines
3.2 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"ID": "CVE-2015-0837",
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a \"Last-Level Cache Side-Channel Attack.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Other"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "GNU",
"product": {
"product_data": [
{
"product_name": "Libgcrypt",
"version": {
"version_data": [
{
"version_value": "before 1.6.3"
}
]
}
},
{
"product_name": "GnuPG",
"version": {
"version_data": [
{
"version_value": "before 1.4.19"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "http://www.debian.org/security/2015/dsa-3184",
"url": "http://www.debian.org/security/2015/dsa-3184"
},
{
"refsource": "MISC",
"name": "http://www.debian.org/security/2015/dsa-3185",
"url": "http://www.debian.org/security/2015/dsa-3185"
},
{
"refsource": "CONFIRM",
"name": "https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html",
"url": "https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html"
},
{
"refsource": "CONFIRM",
"name": "https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html",
"url": "https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html"
},
{
"refsource": "MISC",
"name": "https://ieeexplore.ieee.org/document/7163050",
"url": "https://ieeexplore.ieee.org/document/7163050"
}
]
}
}