CVE-2021-33560
Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.
System detected CVE-2021-33560 with a risk of 4.4
System created a ticket for CVE-2021-33560
Everything after this entry will be synced with the external system. The ticket can be found at https://github.com/l3montree-dev/devguard-action/issues/130
- S
Sebastian Kawelke updated the risk assessment from 4.4 to 2.6
Confidentiality Requirement updated: high -> low, Availability Requirement updated: low -> high
- S
Sebastian Kawelke updated the risk assessment from 2.2 to 1.3
Confidentiality Requirement updated: high -> low, Availability Requirement updated: low -> high
- S
Sebastian Kawelke updated the risk assessment from 2.6 to 4.25
Confidentiality Requirement updated: low -> high
- S
Sebastian Kawelke updated the risk assessment from 1.3 to 2.12
Confidentiality Requirement updated: low -> high
System updated the risk assessment from 2.12 to 2.2
System recalculated raw risk assessment
System updated the risk assessment from 4.25 to 4.4
System recalculated raw risk assessment
System updated the risk assessment from 2.2 to 2.21
System recalculated raw risk assessment
System updated the risk assessment from 4.4 to 4.42
System recalculated raw risk assessment
System fixed CVE-2021-33560
System fixed CVE-2021-33560
System detected CVE-2021-33560 with a risk of 2.21
System updated the risk assessment from 2.21 to 4.42
System recalculated raw risk assessment
Add a comment
Affected component
debian/libgcrypt20