First published: Tue Jun 19 2018(Updated: )
Keegan Ryan discovered that Libgcrypt was susceptible to a side-channel attack. A local attacker could possibly use this attack to recover ECDSA private keys.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libgcrypt20 | <1.8.1-4ubuntu1.1 | 1.8.1-4ubuntu1.1 |
=18.04 | ||
All of | ||
ubuntu/libgcrypt20 | <1.7.8-2ubuntu1.1 | 1.7.8-2ubuntu1.1 |
=17.10 | ||
All of | ||
ubuntu/libgcrypt20 | <1.6.5-2ubuntu0.5 | 1.6.5-2ubuntu0.5 |
=16.04 | ||
All of | ||
ubuntu/libgcrypt11 | <1.5.3-2ubuntu4.6 | 1.5.3-2ubuntu4.6 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Libgcrypt vulnerability is USN-3689-1.
The Libgcrypt vulnerability discovered by Keegan Ryan is susceptible to a side-channel attack that could allow a local attacker to recover ECDSA private keys.
The Libgcrypt vulnerability affects Ubuntu versions 18.04, 17.10, 16.04, and 14.04.
To fix the Libgcrypt vulnerability on Ubuntu 18.04, update the libgcrypt20 package to version 1.8.1-4ubuntu1.1.
More information about the Libgcrypt vulnerability can be found on the Ubuntu security page: [link](https://ubuntu.com/security/CVE-2018-0495).