Search for packages
purl | pkg:deb/ubuntu/libgcrypt11@1.5.3-2ubuntu4.5 |
Next non-vulnerable version | 1.5.3-2ubuntu4.6 |
Latest non-vulnerable version | 1.5.3-2ubuntu4.6 |
Risk | 4.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-d91d-8t7r-aaag
Aliases: CVE-2018-0495 |
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-vavn-12uu-aaan | libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used. |
CVE-2017-7526
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|