Gnupg

Libgcrypt

18 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.26%
  • Veröffentlicht 13.06.2018 23:29:00
  • Zuletzt bearbeitet 21.11.2024 03:38:21

Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka ...

Exploit
  • EPSS 0.52%
  • Veröffentlicht 07.02.2018 23:29:01
  • Zuletzt bearbeitet 21.11.2024 04:11:15

cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of...

  • EPSS 1.86%
  • Veröffentlicht 29.08.2017 22:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.

  • EPSS 0.65%
  • Veröffentlicht 11.06.2017 02:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

In Libgcrypt before 1.7.7, an attacker who learns the EdDSA session key (from side-channel observation during the signing process) can easily recover the long-term secret key. 1.7.7 makes a cipher/ecc-eddsa.c change to store this session key in secur...

  • EPSS 2.69%
  • Veröffentlicht 13.12.2016 20:59:04
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 46...

  • EPSS 0.07%
  • Veröffentlicht 19.04.2016 21:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.

  • EPSS 0.07%
  • Veröffentlicht 10.10.2014 01:55:10
  • Zuletzt bearbeitet 06.05.2026 22:30:45

Libgcrypt before 1.5.4, as used in GnuPG and other products, does not properly perform ciphertext normalization and ciphertext randomization, which makes it easier for physically proximate attackers to conduct key-extraction attacks by leveraging the...

  • EPSS 0.09%
  • Veröffentlicht 19.08.2013 23:55:09
  • Zuletzt bearbeitet 29.04.2026 01:13:23

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.