CVE-2017-7526
Publication date 29 June 2017
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| gnupg1 | ||
| 18.04 LTS bionic |
Not affected
|
|
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty | Not in release | |
| gnupg | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial |
Fixed 1.4.20-1ubuntu3.3
|
|
| 14.04 LTS trusty |
Fixed 1.4.16-1ubuntu2.6
|
|
| libgcrypt11 | ||
| 18.04 LTS bionic | Not in release | |
| 16.04 LTS xenial | Not in release | |
| 14.04 LTS trusty |
Fixed 1.5.3-2ubuntu4.5
|
|
| libgcrypt20 | ||
| 18.04 LTS bionic |
Not affected
|
|
| 16.04 LTS xenial |
Fixed 1.6.5-2ubuntu0.3
|
|
| 14.04 LTS trusty | Not in release |
Patch details
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | High |
| Privileges required | None |
| User interaction | None |
| Scope | Changed |
| Confidentiality | High |
| Integrity impact | None |
| Availability impact | None |
| Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3733-1
- GnuPG vulnerability
- 7 August 2018
- USN-3733-2
- GnuPG vulnerability
- 15 August 2018
- USN-3347-2
- Libgcrypt vulnerability
- 17 July 2017
- USN-3347-1
- Libgcrypt vulnerabilities
- 3 July 2017