CVE-2017-7526
Publication date 29 June 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
Status
Package | Ubuntu Release | Status |
---|---|---|
gnupg | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial |
Fixed 1.4.20-1ubuntu3.3
|
|
14.04 LTS trusty |
Fixed 1.4.16-1ubuntu2.6
|
|
gnupg1 | ||
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
libgcrypt11 | ||
18.04 LTS bionic | Not in release | |
16.04 LTS xenial | Not in release | |
14.04 LTS trusty |
Fixed 1.5.3-2ubuntu4.5
|
|
libgcrypt20 | ||
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Fixed 1.6.5-2ubuntu0.3
|
|
14.04 LTS trusty | Not in release |
Patch details
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.8 · Medium |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Changed |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3733-1
- GnuPG vulnerability
- 7 August 2018
- USN-3733-2
- GnuPG vulnerability
- 15 August 2018
- USN-3347-2
- Libgcrypt vulnerability
- 17 July 2017
- USN-3347-1
- Libgcrypt vulnerabilities
- 3 July 2017