Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.debian.org/security/2017/dsa-3959 | Patch Third Party Advisory | 
| https://security-tracker.debian.org/tracker/CVE-2017-0379 | Patch Third Party Advisory | 
| https://lists.debian.org/debian-security-announce/2017/msg00221.html | Mailing List Patch Third Party Advisory | 
| https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b | Issue Tracking Patch Third Party Advisory | 
| https://eprint.iacr.org/2017/806 | Mailing List Third Party Advisory | 
| https://bugs.debian.org/873383 | Issue Tracking Third Party Advisory | 
| http://www.securityfocus.com/bid/100503 | Third Party Advisory VDB Entry | 
| http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html | |
| https://security.netapp.com/advisory/ntap-20180726-0002/ | |
| http://www.securitytracker.com/id/1041294 | |
| https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html | 
Information
                Published : 2017-08-29 15:29
Updated : 2019-01-16 11:29
NVD link : CVE-2017-0379
Mitre link : CVE-2017-0379
JSON object : View
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
                debian
- debian_linux
 
gnupg
- libgcrypt
 


