CVE-2024-2236

SOURCE - nist

Summary

A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.

EPSS Score: 0.00045 (0.148)

Common Weakness Enumeration (CWE)

SOURCE - nist

Observable Timing Discrepancy

SOURCE - redhat

Observable Timing Discrepancy

Covert Timing Channel


debian

CREATED


UPDATED



EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-
RATING UNAVAILABLE FROM SOURCE
PackageTypeOS NameOS VersionAffected RangesFix Versions
debian/libgcrypt20debdebian12>=1.10.1-3Not yet available
debian/libgcrypt20debdebian13>=1.10.3-3Not yet available
debian/libgcrypt20debdebianunstable>=1.10.3-3Not yet available
debian/libgcrypt20debdebian10>=1.8.4-5+deb10u1Not yet available
debian/libgcrypt20debdebian11>=1.8.7-6Not yet available

Severity and metrics

No CVSS data available from this source.

nist

CREATED


UPDATED



EXPLOITABILITY SCORE

2.2


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

5.9medium

ubuntu

CREATED


UPDATED



EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Amedium

redhat

CREATED


UPDATED



EXPLOITABILITY SCORE

2.2


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

5.9medium