Information Exposure Affecting libgcrypt20 package, versions <1.6.3-2


0.0
medium

Snyk CVSS

    Attack Complexity High
    Confidentiality High

    Threat Intelligence

    EPSS 0.1% (41st percentile)
Expand this section
NVD
4.2 medium
Expand this section
Red Hat
2.9 low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIAN10-LIBGCRYPT20-391906
  • published 27 Jun 2018
  • disclosed 29 Nov 2019

How to fix?

Upgrade Debian:10 libgcrypt20 to version 1.6.3-2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libgcrypt20 package and not the libgcrypt20 package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluctuations in the electromagnetic field during multiplication.