libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 03:32
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.1 |
References | () http://www.securityfocus.com/bid/99338 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1038915 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://eprint.iacr.org/2017/627 - Third Party Advisory | |
References | () https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=78130828e9a140a9de4dafadbc844dbb64cb709a - | |
References | () https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=8725c99ffa41778f382ca97233183bcd687bb0ce - | |
References | () https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=e6a3dc9900433bbc8ad362a595a3837318c28fa9 - | |
References | () https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html - Mailing List, Vendor Advisory | |
References | () https://usn.ubuntu.com/3733-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3733-2/ - Third Party Advisory | |
References | () https://www.debian.org/security/2017/dsa-3901 - Third Party Advisory | |
References | () https://www.debian.org/security/2017/dsa-3960 - Third Party Advisory |
07 Nov 2023, 02:50
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-07-26 13:29
Updated : 2024-11-21 03:32
NVD link : CVE-2017-7526
Mitre link : CVE-2017-7526
CVE.ORG link : CVE-2017-7526
JSON object : View
Products Affected
canonical
- ubuntu_linux
debian
- debian_linux
gnupg
- libgcrypt