CVE-2017-7526

NameCVE-2017-7526
DescriptionUse of left-to-right sliding window method allows full RSA key recovery
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1015-1, DLA-1080-1, DSA-3901-1, DSA-3960-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnupg (PTS)wheezy1.4.12-7+deb7u7vulnerable
wheezy (security)1.4.12-7+deb7u9fixed
jessie (security), jessie1.4.18-7+deb8u4fixed
gnupg1 (PTS)stretch1.4.21-4vulnerable
buster, sid1.4.22-3fixed
gnupg2 (PTS)wheezy, wheezy (security)2.0.19-2+deb7u2fixed
jessie2.0.26-6+deb8u1fixed
stretch2.1.18-8~deb9u1fixed
buster, sid2.2.3-1fixed
libgcrypt11 (PTS)wheezy1.5.0-5+deb7u4vulnerable
wheezy (security)1.5.0-5+deb7u6fixed
libgcrypt20 (PTS)jessie (security), jessie1.6.3-2+deb8u4fixed
stretch (security), stretch1.7.6-2+deb9u2fixed
buster, sid1.8.1-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnupgsource(unstable)(unfixed)
gnupgsourcejessie1.4.18-7+deb8u4DSA-3960-1
gnupgsourcewheezy1.4.12-7+deb7u9DLA-1080-1
gnupg1source(unstable)1.4.22-1
gnupg2source(unstable)(not affected)
libgcrypt11source(unstable)(unfixed)
libgcrypt11sourcewheezy1.5.0-5+deb7u6DLA-1015-1
libgcrypt20source(unstable)1.7.8-1
libgcrypt20sourcejessie1.6.3-2+deb8u4DSA-3901-1
libgcrypt20sourcestretch1.7.6-2+deb9u1DSA-3901-1

Notes

- gnupg2 <not-affected> (Uses system libgcrypt)
[stretch] - gnupg1 <no-dsa> (Only affects the legacy packages)
https://eprint.iacr.org/2017/627
Fixes for RSA exponent blinding fixes (A):
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=a9f612def801c8145d551d995475e5d51a4c988c
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=aff5fd0f2650e24cf99efcd7b499627ea48782c3
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=312101e1f266314b4391fcdbe11c03de5c147e38
Fixes for mpi_powm itsef (B):
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=0e6788517eac6f508fa32ec5d5c1cada7fb980bc
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=fbd10abc057453789017f11c7f1fc8e6c61b79a3
For the particular attack to RSA, either (A) or (B) is enough. In
general cases, (A) plus (B) is needed.
For GnuPG: https://lists.gnupg.org/pipermail/gnupg-users/2017-July/058598.html
GnuPG: https://dev.gnupg.org/rC8725c99ffa41778f382ca97233183bcd687bb0ce
GnuPG1: https://dev.gnupg.org/D438

Search for package or bug name: Reporting problems