CentOS Errata and Security Advisory CESA-2013:1457
The libgcrypt library provides general-purpose implementations of various cryptographic algorithms.
It was found that GnuPG was vulnerable to the Yarom/Falkner flush+reload cache side-channel attack on the RSA secret exponent. An attacker able to execute a process on the logical CPU that shared the L3 cache with the GnuPG process (such as a different local user or a user of a KVM guest running on the same host with the kernel same-page merging functionality enabled) could possibly use this flaw to obtain portions of the RSA secret key. (CVE-2013-4242)
All libgcrypt users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.
Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2013-October/032026.html http://lists.centos.org/pipermail/centos-announce/2013-October/032030.html
Affected packages: libgcrypt libgcrypt-devel
Upstream details at: https://rhn.redhat.com/errata/RHSA-2013-1457.html