Debian Libcrypto vulnerabilities
13 known vulnerabilities affecting debian/libcrypto.
Total CVEs
13
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH4MEDIUM5LOW3
Vulnerabilities
Page 1 of 1
CVE-2024-28285CRITICALCVSS 9.82024
CVE-2024-28285 [CRITICAL] CVE-2024-28285: libcrypto++ - A Fault Injection vulnerability in the SymmetricDecrypt function in cryptopp/elg...
A Fault Injection vulnerability in the SymmetricDecrypt function in cryptopp/elgamal.h of Cryptopp Crypto++ 8.9, allows an attacker to co-reside in the same system with a victim process to disclose information and escalate privileges.
Scope: local
bookworm: open
bullseye: open
forky: open
sid: open
trixie: open
debian
CVE-2023-50981HIGHCVSS 7.52023
CVE-2023-50981 [HIGH] CVE-2023-50981: libcrypto++ - ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to c...
ModularSquareRoot in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (infinite loop) via crafted DER public-key data associated with squared odd numbers, such as the square of 268995137513890432434389773128616504853.
Scope: local
bookworm: open
bullseye: open
forky: open
sid: open
trixie: open
debian
CVE-2023-50980HIGHCVSS 7.5fixed in libcrypto++ 8.9.0-2 (forky)2023
CVE-2023-50980 [HIGH] CVE-2023-50980: libcrypto++ - gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a de...
gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing.
Scope: local
bookworm: open
bullseye: open
forky: resolved (fixed in 8.9.0-2)
sid: resolved (fixed in 8.9.0-2)
trixie: resolved (f
debian
CVE-2023-50979MEDIUMCVSS 5.92023
CVE-2023-50979 [MEDIUM] CVE-2023-50979: libcrypto++ - Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during decryptio...
Crypto++ (aka cryptopp) through 8.9.0 has a Marvin side channel during decryption with PKCS#1 v1.5 padding.
Scope: local
bookworm: open
bullseye: open
forky: open
sid: open
trixie: open
debian
CVE-2022-48570MEDIUMCVSS 5.92022
CVE-2022-48570 [MEDIUM] CVE-2022-48570: libcrypto++ - Crypto++ through 8.4 contains a timing side channel in ECDSA signature generatio...
Crypto++ through 8.4 contains a timing side channel in ECDSA signature generation. Function FixedSizeAllocatorWithCleanup could write to memory outside of the allocation if the allocated memory was not 16-byte aligned. NOTE: this issue exists because the CVE-2019-14318 fix was intentionally removed for functionality reasons.
Scope: local
bookworm: open
bullsey
debian
CVE-2021-40530MEDIUMCVSS 5.9fixed in libcrypto++ 8.6.0-1 (bookworm)2021
CVE-2021-40530 [MEDIUM] CVE-2021-40530: libcrypto++ - The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery bec...
The ElGamal implementation in Crypto++ through 8.5 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against
debian
CVE-2019-14318LOWCVSS 5.9fixed in libcrypto++ 5.6.4-9 (bookworm)2019
CVE-2019-14318 [MEDIUM] CVE-2019-14318: libcrypto++ - Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature gen...
Crypto++ 8.3.0 and earlier contains a timing side channel in ECDSA signature generation. This allows a local or remote attacker, able to measure the duration of hundreds to thousands of signing operations, to compute the private key used. The issue occurs because scalar multiplication in ecp.cpp (prime field curves, small leakage) and algebra.cpp (binary field
debian
CVE-2017-9434MEDIUMCVSS 5.3fixed in libcrypto++ 5.6.4-7 (bookworm)2017
CVE-2017-9434 [MEDIUM] CVE-2017-9434: libcrypto++ - Crypto++ (aka cryptopp) through 5.6.5 contains an out-of-bounds read vulnerabili...
Crypto++ (aka cryptopp) through 5.6.5 contains an out-of-bounds read vulnerability in zinflate.cpp in the Inflator filter.
Scope: local
bookworm: resolved (fixed in 5.6.4-7)
bullseye: resolved (fixed in 5.6.4-7)
forky: resolved (fixed in 5.6.4-7)
sid: resolved (fixed in 5.6.4-7)
trixie: resolved (fixed in 5.6.4-7)
debian
CVE-2016-9939HIGHCVSS 7.5fixed in libcrypto++ 5.6.4-5 (bookworm)2016
CVE-2016-9939 [HIGH] CVE-2016-9939: libcrypto++ - Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER d...
Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the length field of the ASN.1 object. If there is not enough content octets in the ASN.1 object, then the function will fail and the memory block will be zeroed even if its unused. There is a noticeable delay during the
debian
CVE-2016-3995HIGHCVSS 7.5fixed in libcrypto++ 5.6.3-6 (bookworm)2016
CVE-2016-3995 [HIGH] CVE-2016-3995: libcrypto++ - The timing attack protection in Rijndael::Enc::ProcessAndXorBlock and Rijndael::...
The timing attack protection in Rijndael::Enc::ProcessAndXorBlock and Rijndael::Dec::ProcessAndXorBlock in Crypto++ (aka cryptopp) before 5.6.4 may be optimized out by the compiler, which allows attackers to conduct timing attacks.
Scope: local
bookworm: resolved (fixed in 5.6.3-6)
bullseye: resolved (fixed in 5.6.3-6)
forky: resolved (fixed in 5.6.3-6)
sid: resol
debian
CVE-2016-7420LOWCVSS 5.92016
CVE-2016-7420 [MEDIUM] CVE-2016-7420: libcrypto++ - Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a co...
Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG definition disabling the many assert calls that are unintended in production use, which might allow context-dependent attackers to obtain sensitive information by leveraging access to process memory after an assertion failure, as demonstrated by reading a core dump.
debian
CVE-2016-7544LOWCVSS 7.52016
CVE-2016-7544 [HIGH] CVE-2016-7544: libcrypto++ - Crypto++ 5.6.4 incorrectly uses Microsoft's stack-based _malloca and _freea func...
Crypto++ 5.6.4 incorrectly uses Microsoft's stack-based _malloca and _freea functions. The library will request a block of memory to align a table in memory. If the table is later reallocated, then the wrong pointer could be freed.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2015-2141MEDIUMCVSS 5.0fixed in libcrypto++ 5.6.1-7 (bookworm)2015
CVE-2015-2141 [MEDIUM] CVE-2015-2141: libcrypto++ - The InvertibleRWFunction::CalculateInverse function in rw.cpp in libcrypt++ 5.6....
The InvertibleRWFunction::CalculateInverse function in rw.cpp in libcrypt++ 5.6.2 does not properly blind private key operations for the Rabin-Williams digital signature algorithm, which allows remote attackers to obtain private keys via a timing attack.
Scope: local
bookworm: resolved (fixed in 5.6.1-7)
bullseye: resolved (fixed in 5.6.1-7)
forky: resolved (fix
debian