Description:
In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.)

Severity: Unknown
More Information: https://security-tracker.debian.org/tracker/CVE-2019-12904

Namespace: debian:9
Feature: libgcrypt20
Feature Version: 1.7.6-2+deb9u3
Fixed By Version:
Assessment:
Ignore by apapadimoulis@inedo.local on 7/1/2020 1:31:20 AM
Expiration:
9/29/2020 1:31:20 AM (90 days from assessment)