Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-3345

Опубликовано: 29 янв. 2021
Источник: debian
EPSS Низкий

Описание

_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libgcrypt20fixed1.9.1-1experimentalpackage
libgcrypt20not-affectedpackage

Примечания

  • https://bugs.chromium.org/p/project-zero/issues/detail?id=2145

  • https://lists.gnupg.org/pipermail/gnupg-announce/2021q1/000456.html

  • https://dev.gnupg.org/T5275

  • Introduced by: https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=e76617cbab018dd8f41fd6b4ec6740b5303f7e13

  • Fixed by: https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=512c0c75276949f13b6373b5c04f7065af750b08

EPSS

Процентиль: 90%
0.05706
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 5 лет назад

_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.

CVSS3: 9.8
redhat
около 5 лет назад

_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.

CVSS3: 7.8
nvd
около 5 лет назад

_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.

CVSS3: 7.8
github
больше 3 лет назад

_gcry_md_block_write in cipher/hash-common.c in Libgcrypt before 1.9.1 has a heap-based buffer overflow when the digest final function sets a large count value.

CVSS3: 7.8
fstec
около 5 лет назад

Уязвимость функции _gcry_md_block_write (cipher / hash-common.c) криптографической библиотеки Libgcrypt, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 90%
0.05706
Низкий