Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-0379 (GCVE-0-2017-0379)
Vulnerability from cvelistv5 – Published: 2017-08-29 22:00 – Updated: 2024-08-05 13:03- local side-channel attack
| URL | Tags |
|---|---|
| http://www.securityfocus.com/bid/100503 | vdb-entryx_refsource_BID |
| http://www.oracle.com/technetwork/security-adviso… | x_refsource_CONFIRM |
| https://www.oracle.com/technetwork/security-advis… | x_refsource_CONFIRM |
| http://www.securitytracker.com/id/1041294 | vdb-entryx_refsource_SECTRACK |
| https://www.debian.org/security/2017/dsa-3959 | vendor-advisoryx_refsource_DEBIAN |
| https://lists.debian.org/debian-security-announce… | x_refsource_MISC |
| https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcr… | x_refsource_MISC |
| https://eprint.iacr.org/2017/806 | x_refsource_MISC |
| https://security-tracker.debian.org/tracker/CVE-2… | x_refsource_MISC |
| https://security.netapp.com/advisory/ntap-2018072… | x_refsource_CONFIRM |
| https://bugs.debian.org/873383 | x_refsource_MISC |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T13:03:56.982Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "100503",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/100503"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name": "1041294",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1041294"
},
{
"name": "DSA-3959",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2017/dsa-3959"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://lists.debian.org/debian-security-announce/2017/msg00221.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=da780c8183cccc8f533c8ace8211ac2cb2bdee7b"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://eprint.iacr.org/2017/806"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2017-0379"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20180726-0002/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugs.debian.org/873383"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "libgcrypt",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "libgcrypt"
}
]
}
],
"datePublic": "2017-08-29T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "local side-channel attack",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-01-16T18:57:01.000Z",
"orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
"shortName": "debian"
},
"references": [
{
"name": "100503",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/100503"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name": "1041294",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1041294"
},
{
"name": "DSA-3959",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2017/dsa-3959"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://lists.debian.org/debian-security-announce/2017/msg00221.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=da780c8183cccc8f533c8ace8211ac2cb2bdee7b"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://eprint.iacr.org/2017/806"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2017-0379"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20180726-0002/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugs.debian.org/873383"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"ID": "CVE-2017-0379",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "libgcrypt",
"version": {
"version_data": [
{
"version_value": "libgcrypt"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "local side-channel attack"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "100503",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100503"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name": "1041294",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041294"
},
{
"name": "DSA-3959",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3959"
},
{
"name": "https://lists.debian.org/debian-security-announce/2017/msg00221.html",
"refsource": "MISC",
"url": "https://lists.debian.org/debian-security-announce/2017/msg00221.html"
},
{
"name": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b",
"refsource": "MISC",
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b"
},
{
"name": "https://eprint.iacr.org/2017/806",
"refsource": "MISC",
"url": "https://eprint.iacr.org/2017/806"
},
{
"name": "https://security-tracker.debian.org/tracker/CVE-2017-0379",
"refsource": "MISC",
"url": "https://security-tracker.debian.org/tracker/CVE-2017-0379"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180726-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180726-0002/"
},
{
"name": "https://bugs.debian.org/873383",
"refsource": "MISC",
"url": "https://bugs.debian.org/873383"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
"assignerShortName": "debian",
"cveId": "CVE-2017-0379",
"datePublished": "2017-08-29T22:00:00.000Z",
"dateReserved": "2016-11-29T00:00:00.000Z",
"dateUpdated": "2024-08-05T13:03:56.982Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2017-0379",
"date": "2026-05-17",
"epss": "0.01856",
"percentile": "0.83243"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.8.0\", \"matchCriteriaId\": \"C3EDDB00-5923-4D66-B2A2-AB9AB5C5FF03\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.\"}, {\"lang\": \"es\", \"value\": \"Libgcrypt en versiones anteriores a la 1.8.1 no considera correctamente ataques de canal lateral Curve25519, lo que facilita que los atacantes descubran una clave secreta relacionada con cipher/ecc.c y mpi/ec.c.\"}]",
"id": "CVE-2017-0379",
"lastModified": "2024-11-21T03:02:52.157",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2017-08-29T22:29:00.173",
"references": "[{\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"source\": \"security@debian.org\"}, {\"url\": \"http://www.securityfocus.com/bid/100503\", \"source\": \"security@debian.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1041294\", \"source\": \"security@debian.org\"}, {\"url\": \"https://bugs.debian.org/873383\", \"source\": \"security@debian.org\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://eprint.iacr.org/2017/806\", \"source\": \"security@debian.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=da780c8183cccc8f533c8ace8211ac2cb2bdee7b\", \"source\": \"security@debian.org\"}, {\"url\": \"https://lists.debian.org/debian-security-announce/2017/msg00221.html\", \"source\": \"security@debian.org\", \"tags\": [\"Mailing List\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://security-tracker.debian.org/tracker/CVE-2017-0379\", \"source\": \"security@debian.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180726-0002/\", \"source\": \"security@debian.org\"}, {\"url\": \"https://www.debian.org/security/2017/dsa-3959\", \"source\": \"security@debian.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\", \"source\": \"security@debian.org\"}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/100503\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1041294\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugs.debian.org/873383\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://eprint.iacr.org/2017/806\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=da780c8183cccc8f533c8ace8211ac2cb2bdee7b\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.debian.org/debian-security-announce/2017/msg00221.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://security-tracker.debian.org/tracker/CVE-2017-0379\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20180726-0002/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.debian.org/security/2017/dsa-3959\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security@debian.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-0379\",\"sourceIdentifier\":\"security@debian.org\",\"published\":\"2017-08-29T22:29:00.173\",\"lastModified\":\"2026-05-13T00:24:29.033\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.\"},{\"lang\":\"es\",\"value\":\"Libgcrypt en versiones anteriores a la 1.8.1 no considera correctamente ataques de canal lateral Curve25519, lo que facilita que los atacantes descubran una clave secreta relacionada con cipher/ecc.c y mpi/ec.c.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.8.0\",\"matchCriteriaId\":\"C3EDDB00-5923-4D66-B2A2-AB9AB5C5FF03\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"security@debian.org\"},{\"url\":\"http://www.securityfocus.com/bid/100503\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041294\",\"source\":\"security@debian.org\"},{\"url\":\"https://bugs.debian.org/873383\",\"source\":\"security@debian.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://eprint.iacr.org/2017/806\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=da780c8183cccc8f533c8ace8211ac2cb2bdee7b\",\"source\":\"security@debian.org\"},{\"url\":\"https://lists.debian.org/debian-security-announce/2017/msg00221.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2017-0379\",\"source\":\"security@debian.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180726-0002/\",\"source\":\"security@debian.org\"},{\"url\":\"https://www.debian.org/security/2017/dsa-3959\",\"source\":\"security@debian.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\",\"source\":\"security@debian.org\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/100503\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041294\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.debian.org/873383\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://eprint.iacr.org/2017/806\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=da780c8183cccc8f533c8ace8211ac2cb2bdee7b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-security-announce/2017/msg00221.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2017-0379\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180726-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2017/dsa-3959\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
GSD-2017-0379
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2017-0379",
"description": "Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.",
"id": "GSD-2017-0379",
"references": [
"https://www.suse.com/security/cve/CVE-2017-0379.html",
"https://www.debian.org/security/2017/dsa-3959",
"https://advisories.mageia.org/CVE-2017-0379.html",
"https://security.archlinux.org/CVE-2017-0379"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-0379"
],
"details": "Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.",
"id": "GSD-2017-0379",
"modified": "2023-12-13T01:20:59.541186Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"ID": "CVE-2017-0379",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "libgcrypt",
"version": {
"version_data": [
{
"version_value": "libgcrypt"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "local side-channel attack"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "100503",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/100503"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"name": "1041294",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1041294"
},
{
"name": "DSA-3959",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3959"
},
{
"name": "https://lists.debian.org/debian-security-announce/2017/msg00221.html",
"refsource": "MISC",
"url": "https://lists.debian.org/debian-security-announce/2017/msg00221.html"
},
{
"name": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b",
"refsource": "MISC",
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b"
},
{
"name": "https://eprint.iacr.org/2017/806",
"refsource": "MISC",
"url": "https://eprint.iacr.org/2017/806"
},
{
"name": "https://security-tracker.debian.org/tracker/CVE-2017-0379",
"refsource": "MISC",
"url": "https://security-tracker.debian.org/tracker/CVE-2017-0379"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180726-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20180726-0002/"
},
{
"name": "https://bugs.debian.org/873383",
"refsource": "MISC",
"url": "https://bugs.debian.org/873383"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.8.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"ID": "CVE-2017-0379"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-3959",
"refsource": "DEBIAN",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2017/dsa-3959"
},
{
"name": "https://security-tracker.debian.org/tracker/CVE-2017-0379",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2017-0379"
},
{
"name": "https://lists.debian.org/debian-security-announce/2017/msg00221.html",
"refsource": "MISC",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-security-announce/2017/msg00221.html"
},
{
"name": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b"
},
{
"name": "https://eprint.iacr.org/2017/806",
"refsource": "MISC",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://eprint.iacr.org/2017/806"
},
{
"name": "https://bugs.debian.org/873383",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/873383"
},
{
"name": "100503",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/100503"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20180726-0002/",
"refsource": "CONFIRM",
"tags": [],
"url": "https://security.netapp.com/advisory/ntap-20180726-0002/"
},
{
"name": "1041294",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id/1041294"
},
{
"name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"refsource": "CONFIRM",
"tags": [],
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2019-01-16T19:29Z",
"publishedDate": "2017-08-29T22:29Z"
}
}
}
CERTFR-2018-AVI-349
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Enterprise Monitor versions 3.4.7.4297 et antérieures | ||
| Oracle | MySQL | MySQL Server versions 5.5.60 et antérieures, versions 5.6.40 et antérieures, versions 5.7.22 et antérieures, versions 8.0.11 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 5.6.40 et antérieures | ||
| Oracle | MySQL | MySQL Client versions 5.5.60 et antérieures, versions 5.6.40 et antérieures, versions 5.7.22 et antérieures, versions 8.0.11 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 8.0.0.8131 et antérieures | ||
| Oracle | MySQL | MySQL Workbench versions 6.3.10 et antérieures, versions 8.0.11 et antérieures | ||
| Oracle | MySQL | MySQL Connectors versions 5.3.10 et antérieures, versions 8.0.11 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 4.0.4.5235 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 5.7.22 et antérieures |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Enterprise Monitor versions 3.4.7.4297 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 5.5.60 et ant\u00e9rieures, versions 5.6.40 et ant\u00e9rieures, versions 5.7.22 et ant\u00e9rieures, versions 8.0.11 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 5.6.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 5.5.60 et ant\u00e9rieures, versions 5.6.40 et ant\u00e9rieures, versions 5.7.22 et ant\u00e9rieures, versions 8.0.11 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 8.0.0.8131 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 6.3.10 et ant\u00e9rieures, versions 8.0.11 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors versions 5.3.10 et ant\u00e9rieures, versions 8.0.11 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 4.0.4.5235 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 5.7.22 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3066"
},
{
"name": "CVE-2018-3080",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3080"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2018-3061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3061"
},
{
"name": "CVE-2017-0379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0379"
},
{
"name": "CVE-2018-3079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3079"
},
{
"name": "CVE-2018-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3073"
},
{
"name": "CVE-2018-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3067"
},
{
"name": "CVE-2018-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3074"
},
{
"name": "CVE-2018-3054",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3054"
},
{
"name": "CVE-2018-3062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3062"
},
{
"name": "CVE-2018-3058",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3058"
},
{
"name": "CVE-2018-3078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3078"
},
{
"name": "CVE-2018-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2598"
},
{
"name": "CVE-2018-3081",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3081"
},
{
"name": "CVE-2018-3060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3060"
},
{
"name": "CVE-2017-5645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5645"
},
{
"name": "CVE-2018-3056",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3056"
},
{
"name": "CVE-2018-3063",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3063"
},
{
"name": "CVE-2018-3075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3075"
},
{
"name": "CVE-2018-2767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2767"
},
{
"name": "CVE-2018-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3071"
},
{
"name": "CVE-2018-3064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3064"
},
{
"name": "CVE-2018-3077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3077"
},
{
"name": "CVE-2018-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3082"
},
{
"name": "CVE-2018-3070",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3070"
},
{
"name": "CVE-2018-3084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3084"
},
{
"name": "CVE-2018-3065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3065"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-349",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2018-4258247 du 17 juillet 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixMSQL"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2018verbose-4258253 du 17 juillet 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018verbose-4258253.html#MSQL"
}
]
}
CERTFR-2018-AVI-349
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Enterprise Monitor versions 3.4.7.4297 et antérieures | ||
| Oracle | MySQL | MySQL Server versions 5.5.60 et antérieures, versions 5.6.40 et antérieures, versions 5.7.22 et antérieures, versions 8.0.11 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 5.6.40 et antérieures | ||
| Oracle | MySQL | MySQL Client versions 5.5.60 et antérieures, versions 5.6.40 et antérieures, versions 5.7.22 et antérieures, versions 8.0.11 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 8.0.0.8131 et antérieures | ||
| Oracle | MySQL | MySQL Workbench versions 6.3.10 et antérieures, versions 8.0.11 et antérieures | ||
| Oracle | MySQL | MySQL Connectors versions 5.3.10 et antérieures, versions 8.0.11 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 4.0.4.5235 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 5.7.22 et antérieures |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Enterprise Monitor versions 3.4.7.4297 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 5.5.60 et ant\u00e9rieures, versions 5.6.40 et ant\u00e9rieures, versions 5.7.22 et ant\u00e9rieures, versions 8.0.11 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 5.6.40 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 5.5.60 et ant\u00e9rieures, versions 5.6.40 et ant\u00e9rieures, versions 5.7.22 et ant\u00e9rieures, versions 8.0.11 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 8.0.0.8131 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 6.3.10 et ant\u00e9rieures, versions 8.0.11 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors versions 5.3.10 et ant\u00e9rieures, versions 8.0.11 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 4.0.4.5235 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 5.7.22 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3066"
},
{
"name": "CVE-2018-3080",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3080"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2018-3061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3061"
},
{
"name": "CVE-2017-0379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0379"
},
{
"name": "CVE-2018-3079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3079"
},
{
"name": "CVE-2018-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3073"
},
{
"name": "CVE-2018-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3067"
},
{
"name": "CVE-2018-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3074"
},
{
"name": "CVE-2018-3054",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3054"
},
{
"name": "CVE-2018-3062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3062"
},
{
"name": "CVE-2018-3058",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3058"
},
{
"name": "CVE-2018-3078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3078"
},
{
"name": "CVE-2018-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2598"
},
{
"name": "CVE-2018-3081",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3081"
},
{
"name": "CVE-2018-3060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3060"
},
{
"name": "CVE-2017-5645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5645"
},
{
"name": "CVE-2018-3056",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3056"
},
{
"name": "CVE-2018-3063",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3063"
},
{
"name": "CVE-2018-3075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3075"
},
{
"name": "CVE-2018-2767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-2767"
},
{
"name": "CVE-2018-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3071"
},
{
"name": "CVE-2018-3064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3064"
},
{
"name": "CVE-2018-3077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3077"
},
{
"name": "CVE-2018-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3082"
},
{
"name": "CVE-2018-3070",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3070"
},
{
"name": "CVE-2018-3084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3084"
},
{
"name": "CVE-2018-3065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3065"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-349",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2018-4258247 du 17 juillet 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixMSQL"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2018verbose-4258253 du 17 juillet 2018",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018verbose-4258253.html#MSQL"
}
]
}
CNVD-2017-30593
Vulnerability from cnvd - Published: 2017-10-18用户可参考如下厂商提供的安全补丁以修复该漏洞: https://gnupg.org/software/libgcrypt/index.html
| Name | GnuPG Libgcrypt <1.8.1 |
|---|
{
"bids": {
"bid": {
"bidNumber": "100503"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-0379"
}
},
"description": "libgcrypt\u662f\u57fa\u4e8eGnuPG\u4ee3\u7801\u7684\u5bc6\u7801\u5e93\u3002\r\n\r\nlibgcrypt\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u8bf7\u6c42\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002",
"discovererName": "NIIBE Yutaka",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttps://gnupg.org/software/libgcrypt/index.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-30593",
"openTime": "2017-10-18",
"patchDescription": "libgcrypt\u662f\u57fa\u4e8eGnuPG\u4ee3\u7801\u7684\u5bc6\u7801\u5e93\u3002\r\n\r\nlibgcrypt\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u8bf7\u6c42\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Libgcrypt\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2017-30593\uff09\u7684\u8865\u4e01",
"products": {
"product": "GnuPG Libgcrypt \u003c1.8.1"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2017-0379",
"serverity": "\u4e2d",
"submitTime": "2017-08-30",
"title": "Libgcrypt\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2017-30593\uff09"
}
FKIE_CVE-2017-0379
Vulnerability from fkie_nvd - Published: 2017-08-29 22:29 - Updated: 2026-05-13 00:24| Vendor | Product | Version | |
|---|---|---|---|
| gnupg | libgcrypt | * | |
| debian | debian_linux | 9.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3EDDB00-5923-4D66-B2A2-AB9AB5C5FF03",
"versionEndIncluding": "1.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c."
},
{
"lang": "es",
"value": "Libgcrypt en versiones anteriores a la 1.8.1 no considera correctamente ataques de canal lateral Curve25519, lo que facilita que los atacantes descubran una clave secreta relacionada con cipher/ecc.c y mpi/ec.c."
}
],
"id": "CVE-2017-0379",
"lastModified": "2026-05-13T00:24:29.033",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-08-29T22:29:00.173",
"references": [
{
"source": "security@debian.org",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/100503"
},
{
"source": "security@debian.org",
"url": "http://www.securitytracker.com/id/1041294"
},
{
"source": "security@debian.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/873383"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://eprint.iacr.org/2017/806"
},
{
"source": "security@debian.org",
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=da780c8183cccc8f533c8ace8211ac2cb2bdee7b"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-security-announce/2017/msg00221.html"
},
{
"source": "security@debian.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2017-0379"
},
{
"source": "security@debian.org",
"url": "https://security.netapp.com/advisory/ntap-20180726-0002/"
},
{
"source": "security@debian.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2017/dsa-3959"
},
{
"source": "security@debian.org",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/100503"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1041294"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/873383"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://eprint.iacr.org/2017/806"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=da780c8183cccc8f533c8ace8211ac2cb2bdee7b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-security-announce/2017/msg00221.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2017-0379"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20180726-0002/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2017/dsa-3959"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
}
],
"sourceIdentifier": "security@debian.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
OPENSUSE-SU-2024:10941-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libgcrypt-cavs-1.9.4-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libgcrypt-cavs-1.9.4-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10941",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10941-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-0379 page",
"url": "https://www.suse.com/security/cve/CVE-2017-0379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7526 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0495 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0495/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12904 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12904/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13627 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3345 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33560 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33560/"
}
],
"title": "libgcrypt-cavs-1.9.4-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10941-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-cavs-1.9.4-1.2.aarch64",
"product": {
"name": "libgcrypt-cavs-1.9.4-1.2.aarch64",
"product_id": "libgcrypt-cavs-1.9.4-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-1.9.4-1.2.aarch64",
"product": {
"name": "libgcrypt-devel-1.9.4-1.2.aarch64",
"product_id": "libgcrypt-devel-1.9.4-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"product": {
"name": "libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"product_id": "libgcrypt-devel-32bit-1.9.4-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-1.9.4-1.2.aarch64",
"product": {
"name": "libgcrypt20-1.9.4-1.2.aarch64",
"product_id": "libgcrypt20-1.9.4-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-32bit-1.9.4-1.2.aarch64",
"product": {
"name": "libgcrypt20-32bit-1.9.4-1.2.aarch64",
"product_id": "libgcrypt20-32bit-1.9.4-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-1.9.4-1.2.aarch64",
"product": {
"name": "libgcrypt20-hmac-1.9.4-1.2.aarch64",
"product_id": "libgcrypt20-hmac-1.9.4-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"product": {
"name": "libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"product_id": "libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-cavs-1.9.4-1.2.ppc64le",
"product": {
"name": "libgcrypt-cavs-1.9.4-1.2.ppc64le",
"product_id": "libgcrypt-cavs-1.9.4-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-1.9.4-1.2.ppc64le",
"product": {
"name": "libgcrypt-devel-1.9.4-1.2.ppc64le",
"product_id": "libgcrypt-devel-1.9.4-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"product": {
"name": "libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"product_id": "libgcrypt-devel-32bit-1.9.4-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libgcrypt20-1.9.4-1.2.ppc64le",
"product": {
"name": "libgcrypt20-1.9.4-1.2.ppc64le",
"product_id": "libgcrypt20-1.9.4-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"product": {
"name": "libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"product_id": "libgcrypt20-32bit-1.9.4-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"product": {
"name": "libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"product_id": "libgcrypt20-hmac-1.9.4-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"product": {
"name": "libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"product_id": "libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-cavs-1.9.4-1.2.s390x",
"product": {
"name": "libgcrypt-cavs-1.9.4-1.2.s390x",
"product_id": "libgcrypt-cavs-1.9.4-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-1.9.4-1.2.s390x",
"product": {
"name": "libgcrypt-devel-1.9.4-1.2.s390x",
"product_id": "libgcrypt-devel-1.9.4-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"product": {
"name": "libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"product_id": "libgcrypt-devel-32bit-1.9.4-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libgcrypt20-1.9.4-1.2.s390x",
"product": {
"name": "libgcrypt20-1.9.4-1.2.s390x",
"product_id": "libgcrypt20-1.9.4-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libgcrypt20-32bit-1.9.4-1.2.s390x",
"product": {
"name": "libgcrypt20-32bit-1.9.4-1.2.s390x",
"product_id": "libgcrypt20-32bit-1.9.4-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-1.9.4-1.2.s390x",
"product": {
"name": "libgcrypt20-hmac-1.9.4-1.2.s390x",
"product_id": "libgcrypt20-hmac-1.9.4-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"product": {
"name": "libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"product_id": "libgcrypt20-hmac-32bit-1.9.4-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libgcrypt-cavs-1.9.4-1.2.x86_64",
"product": {
"name": "libgcrypt-cavs-1.9.4-1.2.x86_64",
"product_id": "libgcrypt-cavs-1.9.4-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-1.9.4-1.2.x86_64",
"product": {
"name": "libgcrypt-devel-1.9.4-1.2.x86_64",
"product_id": "libgcrypt-devel-1.9.4-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"product": {
"name": "libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"product_id": "libgcrypt-devel-32bit-1.9.4-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-1.9.4-1.2.x86_64",
"product": {
"name": "libgcrypt20-1.9.4-1.2.x86_64",
"product_id": "libgcrypt20-1.9.4-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-32bit-1.9.4-1.2.x86_64",
"product": {
"name": "libgcrypt20-32bit-1.9.4-1.2.x86_64",
"product_id": "libgcrypt20-32bit-1.9.4-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-1.9.4-1.2.x86_64",
"product": {
"name": "libgcrypt20-hmac-1.9.4-1.2.x86_64",
"product_id": "libgcrypt20-hmac-1.9.4-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64",
"product": {
"name": "libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64",
"product_id": "libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-cavs-1.9.4-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64"
},
"product_reference": "libgcrypt-cavs-1.9.4-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-cavs-1.9.4-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le"
},
"product_reference": "libgcrypt-cavs-1.9.4-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-cavs-1.9.4-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x"
},
"product_reference": "libgcrypt-cavs-1.9.4-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-cavs-1.9.4-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64"
},
"product_reference": "libgcrypt-cavs-1.9.4-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-1.9.4-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64"
},
"product_reference": "libgcrypt-devel-1.9.4-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-1.9.4-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le"
},
"product_reference": "libgcrypt-devel-1.9.4-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-1.9.4-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x"
},
"product_reference": "libgcrypt-devel-1.9.4-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-1.9.4-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64"
},
"product_reference": "libgcrypt-devel-1.9.4-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-32bit-1.9.4-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64"
},
"product_reference": "libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-32bit-1.9.4-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le"
},
"product_reference": "libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-32bit-1.9.4-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x"
},
"product_reference": "libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt-devel-32bit-1.9.4-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64"
},
"product_reference": "libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-1.9.4-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64"
},
"product_reference": "libgcrypt20-1.9.4-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-1.9.4-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le"
},
"product_reference": "libgcrypt20-1.9.4-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-1.9.4-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x"
},
"product_reference": "libgcrypt20-1.9.4-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-1.9.4-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64"
},
"product_reference": "libgcrypt20-1.9.4-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-32bit-1.9.4-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64"
},
"product_reference": "libgcrypt20-32bit-1.9.4-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-32bit-1.9.4-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le"
},
"product_reference": "libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-32bit-1.9.4-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x"
},
"product_reference": "libgcrypt20-32bit-1.9.4-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-32bit-1.9.4-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64"
},
"product_reference": "libgcrypt20-32bit-1.9.4-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-1.9.4-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64"
},
"product_reference": "libgcrypt20-hmac-1.9.4-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-1.9.4-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le"
},
"product_reference": "libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-1.9.4-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x"
},
"product_reference": "libgcrypt20-hmac-1.9.4-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-1.9.4-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64"
},
"product_reference": "libgcrypt20-hmac-1.9.4-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64"
},
"product_reference": "libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le"
},
"product_reference": "libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-32bit-1.9.4-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x"
},
"product_reference": "libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
},
"product_reference": "libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-0379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-0379"
}
],
"notes": [
{
"category": "general",
"text": "Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-0379",
"url": "https://www.suse.com/security/cve/CVE-2017-0379"
},
{
"category": "external",
"summary": "SUSE Bug 1055837 for CVE-2017-0379",
"url": "https://bugzilla.suse.com/1055837"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2017-0379"
},
{
"cve": "CVE-2017-7526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7526"
}
],
"notes": [
{
"category": "general",
"text": "libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7526",
"url": "https://www.suse.com/security/cve/CVE-2017-7526"
},
{
"category": "external",
"summary": "SUSE Bug 1046607 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1046607"
},
{
"category": "external",
"summary": "SUSE Bug 1047462 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1047462"
},
{
"category": "external",
"summary": "SUSE Bug 1123792 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1123792"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-7526"
},
{
"cve": "CVE-2018-0495",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0495"
}
],
"notes": [
{
"category": "general",
"text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0495",
"url": "https://www.suse.com/security/cve/CVE-2018-0495"
},
{
"category": "external",
"summary": "SUSE Bug 1097410 for CVE-2018-0495",
"url": "https://bugzilla.suse.com/1097410"
},
{
"category": "external",
"summary": "SUSE Bug 1121207 for CVE-2018-0495",
"url": "https://bugzilla.suse.com/1121207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-0495"
},
{
"cve": "CVE-2019-12904",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12904"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor\u0027s position is that the issue report cannot be validated because there is no description of an attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12904",
"url": "https://www.suse.com/security/cve/CVE-2019-12904"
},
{
"category": "external",
"summary": "SUSE Bug 1138939 for CVE-2019-12904",
"url": "https://bugzilla.suse.com/1138939"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-12904"
},
{
"cve": "CVE-2019-13627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13627"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13627",
"url": "https://www.suse.com/security/cve/CVE-2019-13627"
},
{
"category": "external",
"summary": "SUSE Bug 1148987 for CVE-2019-13627",
"url": "https://bugzilla.suse.com/1148987"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-13627"
},
{
"cve": "CVE-2021-3345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3345"
}
],
"notes": [
{
"category": "general",
"text": "_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3345",
"url": "https://www.suse.com/security/cve/CVE-2021-3345"
},
{
"category": "external",
"summary": "SUSE Bug 1181632 for CVE-2021-3345",
"url": "https://bugzilla.suse.com/1181632"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-3345"
},
{
"cve": "CVE-2021-33560",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33560"
}
],
"notes": [
{
"category": "general",
"text": "Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33560",
"url": "https://www.suse.com/security/cve/CVE-2021-33560"
},
{
"category": "external",
"summary": "SUSE Bug 1187212 for CVE-2021-33560",
"url": "https://bugzilla.suse.com/1187212"
},
{
"category": "external",
"summary": "SUSE Bug 1189854 for CVE-2021-33560",
"url": "https://bugzilla.suse.com/1189854"
},
{
"category": "external",
"summary": "SUSE Bug 1199664 for CVE-2021-33560",
"url": "https://bugzilla.suse.com/1199664"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-cavs-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt-devel-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-32bit-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-1.9.4-1.2.x86_64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.aarch64",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.ppc64le",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.s390x",
"openSUSE Tumbleweed:libgcrypt20-hmac-32bit-1.9.4-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-33560"
}
]
}
GHSA-J848-FX94-98M4
Vulnerability from github – Published: 2022-05-14 01:40 – Updated: 2025-04-20 03:44Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.
{
"affected": [],
"aliases": [
"CVE-2017-0379"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-08-29T22:29:00Z",
"severity": "HIGH"
},
"details": "Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.",
"id": "GHSA-j848-fx94-98m4",
"modified": "2025-04-20T03:44:09Z",
"published": "2022-05-14T01:40:19Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0379"
},
{
"type": "WEB",
"url": "https://bugs.debian.org/873383"
},
{
"type": "WEB",
"url": "https://eprint.iacr.org/2017/806"
},
{
"type": "WEB",
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=da780c8183cccc8f533c8ace8211ac2cb2bdee7b"
},
{
"type": "WEB",
"url": "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=da780c8183cccc8f533c8ace8211ac2cb2bdee7b"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-security-announce/2017/msg00221.html"
},
{
"type": "WEB",
"url": "https://security-tracker.debian.org/tracker/CVE-2017-0379"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20180726-0002"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2017/dsa-3959"
},
{
"type": "WEB",
"url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/100503"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1041294"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.