CVE-2024-2236
A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.
System detected CVE-2024-2236 with a risk of 3.55
System created a ticket for CVE-2024-2236
Everything after this entry will be synced with the external system. The ticket can be found at https://github.com/l3montree-dev/devguard-action/issues/131
System detected CVE-2024-2236 on another ref: main
System updated the risk assessment from 3.55 to 1.77
System recalculated raw risk assessment
System detected CVE-2024-2236 with scanner: container-scanning:test
- S
Sebastian Kawelke updated the risk assessment from 1.77 to 0.95
Confidentiality Requirement updated: high -> low, Availability Requirement updated: low -> high
- S
Sebastian Kawelke updated the risk assessment from 0.95 to 1.77
Confidentiality Requirement updated: low -> high
System removed scanner: container-scanning
System fixed CVE-2024-2236
Reopen this vulnerability
Affected component
debian/libgcrypt20