Information Exposure Affecting libgcrypt20 package, versions <1.7.9-1
Threat Intelligence
EPSS
0.43% (75th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-LIBGCRYPT20-530090
- published 29 Aug 2017
- disclosed 29 Aug 2017
Introduced: 29 Aug 2017
CVE-2017-0379 Open this link in a new tabHow to fix?
Upgrade Debian:11
libgcrypt20
to version 1.7.9-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libgcrypt20
package and not the libgcrypt20
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
References
- https://security-tracker.debian.org/tracker/CVE-2017-0379
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0379
- https://bugs.debian.org/873383
- https://www.debian.org/security/2017/dsa-3959
- https://eprint.iacr.org/2017/806
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b
- https://lists.debian.org/debian-security-announce/2017/msg00221.html
- https://security.netapp.com/advisory/ntap-20180726-0002/
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securityfocus.com/bid/100503
- http://www.securitytracker.com/id/1041294
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-0379
- https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=da780c8183cccc8f533c8ace8211ac2cb2bdee7b