Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/100503 | vdb entry third party advisory |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html | |
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | |
http://www.securitytracker.com/id/1041294 | vdb entry |
https://www.debian.org/security/2017/dsa-3959 | third party advisory patch vendor advisory |
https://lists.debian.org/debian-security-announce/2017/msg00221.html | mailing list third party advisory patch |
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=da780c8183cccc8f533c8ace8211ac2cb2bdee7b | |
https://eprint.iacr.org/2017/806 | third party advisory mailing list |
https://security-tracker.debian.org/tracker/CVE-2017-0379 | third party advisory patch |
https://security.netapp.com/advisory/ntap-20180726-0002/ | |
https://bugs.debian.org/873383 | issue tracking third party advisory |