[arch-security] [ASA-201707-1] libgcrypt: private key recovery

Remi Gacogne rgacogne at archlinux.org
Mon Jul 3 14:46:17 UTC 2017


Arch Linux Security Advisory ASA-201707-1
=========================================

Severity: High
Date    : 2017-07-03
CVE-ID  : CVE-2017-7526
Package : libgcrypt
Type    : private key recovery
Remote  : No
Link    : https://security.archlinux.org/AVG-338

Summary
=======

The package libgcrypt before version 1.7.8-1 is vulnerable to private
key recovery.

Resolution
==========

Upgrade to 1.7.8-1.

# pacman -Syu "libgcrypt>=1.7.8-1"

The problem has been fixed upstream in version 1.7.8.

Workaround
==========

None.

Description
===========

The pattern of squarings and multiplications in left-to-right sliding
windows in libgcrypt <= 1.7.7 leaks significant information about
exponent bits, allowing for the very efficient recovery of a full
1024-bit RSA key.

Impact
======

A local attacker can use a side-channel attack to recover a secret
private key.

References
==========

https://eprint.iacr.org/2017/627
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=a9f612def801c8145d551d995475e5d51a4c988c;hp=0e6788517eac6f508fa32ec5d5c1cada7fb980bc
https://security.archlinux.org/CVE-2017-7526

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170703/855dba7f/attachment.asc>


More information about the arch-security mailing list