Description
Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-53-1 | gnupg security update |
Debian DLA |
DLA-93-1 | libgcrypt11 security update |
Debian DSA |
DSA-3024-1 | gnupg security update |
Debian DSA |
DSA-3073-1 | libgcrypt11 security update |
EUVD |
EUVD-2014-5163 | Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576. |
Ubuntu USN |
USN-2339-1 | GnuPG vulnerability |
Ubuntu USN |
USN-2339-2 | Libgcrypt vulnerability |
Ubuntu USN |
USN-2554-1 | GnuPG vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T11:41:47.780Z
Reserved: 2014-08-15T00:00:00.000Z
Link: CVE-2014-5270
No data.
Status : Modified
Published: 2014-10-10T01:55:10.383
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-5270
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN