libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/99338 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038915 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526 | Issue Tracking Patch Third Party Advisory |
https://eprint.iacr.org/2017/627 | Third Party Advisory |
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=78130828e9a140a9de4dafadbc844dbb64cb709a | |
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=8725c99ffa41778f382ca97233183bcd687bb0ce | |
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=e6a3dc9900433bbc8ad362a595a3837318c28fa9 | |
https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html | Mailing List Vendor Advisory |
https://usn.ubuntu.com/3733-1/ | Third Party Advisory |
https://usn.ubuntu.com/3733-2/ | Third Party Advisory |
https://www.debian.org/security/2017/dsa-3901 | Third Party Advisory |
https://www.debian.org/security/2017/dsa-3960 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2018-07-26 13:29
Updated : 2023-11-07 02:50
NVD link : CVE-2017-7526
Mitre link : CVE-2017-7526
CVE.ORG link : CVE-2017-7526
JSON object : View
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
gnupg
- libgcrypt