CVE-2024-2236

A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.

  • logo

    System detected CVE-2024-2236 with a risk of 3.55

  • logo

    System created a ticket for CVE-2024-2236

    Everything after this entry will be synced with the external system. The ticket can be found at https://github.com/l3montree-dev/devguard-action/issues/131

  • logo

    System detected CVE-2024-2236 on another ref: main

  • logo

    System created a ticket for CVE-2024-2236

    Everything after this entry will be synced with the external system. The ticket can be found at undefined

  • logo

    System updated the risk assessment from 3.55 to 1.77

    System recalculated raw risk assessment

  • logo

    System detected CVE-2024-2236 with scanner: container-scanning:test

  • S

    Sebastian Kawelke updated the risk assessment from 1.77 to 0.95

    Confidentiality Requirement updated: high -> low, Availability Requirement updated: low -> high

  • S

    Sebastian Kawelke updated the risk assessment from 0.95 to 1.77

    Confidentiality Requirement updated: low -> high

  • logo

    System removed scanner: container-scanning

  • logo

    System fixed CVE-2024-2236

Reopen this vulnerability

You can reopen this vuln, if you plan to mitigate the risk now, or accepted this vuln by accident.

Comment will be synced with https://github.com/l3montree-dev/devguard-action/issues/151
Last calculated at:

Affected component

Logo von deb debian/libgcrypt20

Installed version:
1.10.1-3
Fixed in:
no patch available

Management decisions across the organization

Copyright © 2025 L3montree GmbH and the DevGuard Contributors. All rights reserved. Version 71cda54d19c6900d5d185b8bc7c11608a8a65bac