CVE-2017-9526

Impact:
Low
Public Date:
2017-06-01
CWE:
CWE-385
Bugzilla:
1459887: CVE-2017-9526 libgcrypt: Possible timing attack on EdDSA session key

The MITRE CVE dictionary describes this issue as:

In Libgcrypt before 1.7.7, an attacker who learns the EdDSA session key (from side-channel observation during the signing process) can easily recover the long-term secret key. 1.7.7 makes a cipher/ecc-eddsa.c change to store this session key in secure memory, to ensure that constant-time point operations are used in the MPI library.

Find out more about CVE-2017-9526 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the versions of libgcrypt as shipped with Red Hat Enterprise Linux 5, 6 and 7 as they did not include support for EdDSA cipher.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 5.9
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact None
Availability Impact None

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 libgcrypt Not affected
Red Hat Enterprise Linux 6 libgcrypt Not affected
Red Hat Enterprise Linux 5 libgcrypt Not affected
RHEV Manager 3 mingw-virt-viewer Not affected

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.