Race Condition Affecting libgcrypt20 package, versions *
Snyk CVSS
Attack Complexity
High
User Interaction
Required
Confidentiality
High
Integrity
High
Threat Intelligence
EPSS
0.21% (59th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-LIBGCRYPT20-460491
- published 29 Aug 2019
- disclosed 25 Sep 2019
Introduced: 29 Aug 2019
CVE-2019-13627 Open this link in a new tabHow to fix?
There is no fixed version for Debian:9
libgcrypt20
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcrypt20
package and not the libgcrypt20
package as distributed by Debian
.
See How to fix?
for Debian:9
relevant fixed versions and status.
It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.