CVE-2017-7526
Summary
| CVE | CVE-2017-7526 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-07-26 13:29:00 UTC |
| Updated | 2023-11-07 02:50:00 UTC |
| Description | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Cryptology ePrint Archive: Report 2017/627 |
MISC |
eprint.iacr.org |
Third Party Advisory |
| git.gnupg.org Git - libgcrypt.git/commit |
CONFIRM |
git.gnupg.org |
Patch, Vendor Advisory |
| git.gnupg.org Git - libgcrypt.git/commit |
CONFIRM |
git.gnupg.org |
Patch, Vendor Advisory |
| Debian -- Security Information -- DSA-3901-1 libgcrypt20 |
DEBIAN |
www.debian.org |
Third Party Advisory |
| git.gnupg.org Git - libgcrypt.git/commit |
|
git.gnupg.org |
|
| USN-3733-1: GnuPG vulnerability | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| git.gnupg.org Git - libgcrypt.git/commit |
CONFIRM |
git.gnupg.org |
Patch, Vendor Advisory |
| USN-3733-2: GnuPG vulnerability | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| git.gnupg.org Git - libgcrypt.git/commit |
|
git.gnupg.org |
|
| 1466265 – (CVE-2017-7526) CVE-2017-7526 libgcrypt: Use of left-to-right sliding window method allows full RSA key recovery |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Patch, Third Party Advisory |
| git.gnupg.org Git - libgcrypt.git/commit |
|
git.gnupg.org |
|
| [Announce] Libgcrypt 1.7.8 released to fix CVE-2017-7526 |
MLIST |
lists.gnupg.org |
Mailing List, Vendor Advisory |
| Libgcrypt CVE-2017-7526 Information Disclosure Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| Debian -- Security Information -- DSA-3960-1 gnupg |
DEBIAN |
www.debian.org |
Third Party Advisory |
| Libgcrypt RSA-1024 Sliding-Window Expansion Side Channel Attack Lets Remote Users Recover Keys Used by the Target System in Certain Cases - SecurityTracker |
SECTRACK |
www.securitytracker.com |
Third Party Advisory, VDB Entry |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 500359 Alpine Linux Security Update for gnupg1
- 671105 EulerOS Security Update for libgcrypt (EulerOS-SA-2019-2205)