Gnupg

Libgcrypt

18 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 23.04.2026 04:39:04
  • Zuletzt bearbeitet 27.04.2026 18:33:27

Libgcrypt before 1.12.2 mishandles Dilithium signing. Writes to a static array lack a bounds check but do not use attacker-controlled data.

  • EPSS 0.02%
  • Veröffentlicht 23.04.2026 04:30:26
  • Zuletzt bearbeitet 27.04.2026 18:33:18

Libgcrypt before 1.12.2 sometimes allows a heap-based buffer overflow and denial of service via crafted ECDH ciphertext to gcry_pk_decrypt.

  • EPSS 0.67%
  • Veröffentlicht 06.03.2024 22:15:57
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 06.09.2021 19:15:07
  • Zuletzt bearbeitet 09.06.2025 16:15:33

The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined b...

  • EPSS 0.43%
  • Veröffentlicht 08.06.2021 11:15:07
  • Zuletzt bearbeitet 03.12.2025 15:15:49

Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGam...

  • EPSS 5.71%
  • Veröffentlicht 29.01.2021 15:15:13
  • Zuletzt bearbeitet 21.11.2024 06:21:20

_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.

  • EPSS 0.68%
  • Veröffentlicht 29.11.2019 22:15:11
  • Zuletzt bearbeitet 21.11.2024 02:23:49

The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cach...

  • EPSS 0.14%
  • Veröffentlicht 29.11.2019 22:15:11
  • Zuletzt bearbeitet 21.11.2024 02:08:27

Libgcrypt before 1.6.3 and GnuPG before 1.4.19 does not implement ciphertext blinding for Elgamal decryption, which allows physically proximate attackers to obtain the server's private key by determining factors using crafted ciphertext and the fluct...

  • EPSS 0.25%
  • Veröffentlicht 20.06.2019 00:15:10
  • Zuletzt bearbeitet 21.11.2024 04:23:48

In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation ...

  • EPSS 2.57%
  • Veröffentlicht 26.07.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:32:05

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 w...