Unrated severityNVD Advisory· Published Jul 26, 2018· Updated Dec 17, 2025
CVE-2017-7526
CVE-2017-7526
Description
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- usn.ubuntu.com/3733-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3733-2/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2017/dsa-3901mitrevendor-advisoryx_refsource_DEBIAN
- www.debian.org/security/2017/dsa-3960mitrevendor-advisoryx_refsource_DEBIAN
- www.securityfocus.com/bid/99338mitrevdb-entryx_refsource_BID
- www.securitytracker.com/id/1038915mitrevdb-entryx_refsource_SECTRACK
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- eprint.iacr.org/2017/627mitrex_refsource_MISC
- lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.htmlmitremailing-listx_refsource_MLIST
News mentions
0No linked articles in our index yet.