The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-27703 | The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP. |
Ubuntu USN |
USN-5080-1 | Libgcrypt vulnerabilities |
Ubuntu USN |
USN-5080-2 | Libgcrypt vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 09 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-06-09T15:13:03.906Z
Reserved: 2021-09-06T00:00:00.000Z
Link: CVE-2021-40528
Updated: 2024-08-04T02:44:10.845Z
Status : Modified
Published: 2021-09-06T19:15:07.587
Modified: 2025-06-09T16:15:33.000
Link: CVE-2021-40528
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN