In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.)

Severity: Unknown
More Information:

Namespace: debian:9
Feature: libgcrypt20
Feature Version: 1.7.6-2+deb9u3
Fixed By Version:
Ignore by apapadimoulis@inedo.local on 7/1/2020 1:31:20 AM
9/29/2020 1:31:20 AM (90 days from assessment)