Description
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1015-1 | libgcrypt11 security update |
Debian DLA |
DLA-1080-1 | gnupg security update |
Debian DSA |
DSA-3901-1 | libgcrypt20 security update |
Debian DSA |
DSA-3960-1 | gnupg security update |
EUVD |
EUVD-2017-16542 | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used. |
Ubuntu USN |
USN-3347-1 | Libgcrypt vulnerabilities |
Ubuntu USN |
USN-3347-2 | Libgcrypt vulnerability |
Ubuntu USN |
USN-3733-1 | GnuPG vulnerability |
Ubuntu USN |
USN-3733-2 | GnuPG vulnerability |
References
History
Wed, 17 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-12-17T22:06:14.998Z
Reserved: 2017-04-05T00:00:00.000Z
Link: CVE-2017-7526
Updated: 2024-08-05T16:04:11.873Z
Status : Modified
Published: 2018-07-26T13:29:00.183
Modified: 2024-11-21T03:32:05.007
Link: CVE-2017-7526
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN