CVE-2024-2236
Published: March 7, 2024Last modified: August 7, 2025
Description
A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 5.9 |
| Attack Vector | NETWORK |
| Attack complexity | HIGH |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity impact | NONE |
| Availability impact | NONE |
| Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N |
Notes
https://gitlab.com/redhat/centos-stream/rpms/libgcrypt/-/merge_requests/24/ looks like the solution but it is 186kB patch. https://gitlab.com/redhat-crypto/libgcrypt/libgcrypt-mirror/-/merge_requests/19 is not accepted.
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | libgcrypt | Vulnerable (1.10.1-r0) |
| Stream | libgcrypt | Vulnerable (1.10.1-r0) |