Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the ability to collect voltage data from exposed metal, a different vector than CVE-2013-4576.
http://www.debian.org/security/2014/dsa-3073
http://www.debian.org/security/2014/dsa-3024
http://www.cs.tau.ac.il/~tromer/handsoff/
http://openwall.com/lists/oss-security/2014/08/16/2
http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html