CVE-2018-6829

NameCVE-2018-6829
Descriptioncipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnupg (PTS)jessie, jessie (lts)1.4.18-7+deb8u5vulnerable
gnupg1 (PTS)stretch (security), stretch (lts), stretch1.4.21-4+deb9u1vulnerable
buster1.4.23-1vulnerable
trixie, bullseye, bookworm1.4.23-1.1vulnerable
sid1.4.23-2vulnerable
libgcrypt20 (PTS)jessie, jessie (lts)1.6.3-2+deb8u9vulnerable
stretch (security), stretch (lts), stretch1.7.6-2+deb9u4vulnerable
buster1.8.4-5+deb10u1vulnerable
bullseye1.8.7-6vulnerable
bookworm1.10.1-3vulnerable
sid, trixie1.10.3-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnupgsource(unstable)(unfixed)unimportant
gnupg1source(unstable)(unfixed)unimportant
libgcrypt11source(unstable)(unfixed)unimportant
libgcrypt20source(unstable)(unfixed)unimportant

Notes

https://github.com/weikengchen/attack-on-libgcrypt-elgamal
https://github.com/weikengchen/attack-on-libgcrypt-elgamal/wiki
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004394.html
GnuPG uses ElGamal in hybrid mode only.
This is not a vulnerability in libgcrypt, but in an application using
it in an insecure manner, see also
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004401.html

Search for package or bug name: Reporting problems