Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
References
Link | Resource |
---|---|
https://www.debian.org/security/2017/dsa-3959 | Patch Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2017-0379 | Patch Third Party Advisory |
https://lists.debian.org/debian-security-announce/2017/msg00221.html | Mailing List Patch Third Party Advisory |
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b | Issue Tracking Patch Third Party Advisory |
https://eprint.iacr.org/2017/806 | Mailing List Third Party Advisory |
https://bugs.debian.org/873383 | Issue Tracking Third Party Advisory |
http://www.securityfocus.com/bid/100503 | Third Party Advisory VDB Entry |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html | |
https://security.netapp.com/advisory/ntap-20180726-0002/ | |
http://www.securitytracker.com/id/1041294 | |
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html |
Information
Published : 2017-08-29 15:29
Updated : 2019-01-16 11:29
NVD link : CVE-2017-0379
Mitre link : CVE-2017-0379
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
debian
- debian_linux
gnupg
- libgcrypt