CVE-2017-7526
26.07.2018, 13:29
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.Enginsight
Vendor | Product | Version |
---|---|---|
gnupg | libgcrypt | 𝑥 < 1.7.8 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
gnupg1 |
| ||||||||||||
gnupg2 |
| ||||||||||||
libgcrypt20 |
|

Ubuntu Releases
Ubuntu Product | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
gnupg |
| ||||||||||||||||
gnupg1 |
| ||||||||||||||||
libgcrypt11 |
| ||||||||||||||||
libgcrypt20 |
|
Common Weakness Enumeration
References