Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576.
| Software | From | Fixed in |
|---|---|---|
| gnupg / libgcrypt | - | 1.5.3.x |
| gnupg / libgcrypt | 1.4.6 | 1.4.6.x |
| gnupg / libgcrypt | 1.4.4 | 1.4.4.x |
| gnupg / libgcrypt | 1.5.0 | 1.5.0.x |
| gnupg / libgcrypt | 1.5.1 | 1.5.1.x |
| gnupg / libgcrypt | 1.4.0 | 1.4.0.x |
| gnupg / libgcrypt | 1.5.2 | 1.5.2.x |
| gnupg / libgcrypt | 1.4.3 | 1.4.3.x |
| gnupg / libgcrypt | 1.4.5 | 1.4.5.x |
| debian / debian_linux | 7.0 | 7.0.x |