First published: Sun Jun 11 2017(Updated: )
In Libgcrypt before 1.7.7, an attacker who learns the EdDSA session key (from side-channel observation during the signing process) can easily recover the long-term secret key. 1.7.7 makes a cipher/ecc-eddsa.c change to store this session key in secure memory, to ensure that constant-time point operations are used in the MPI library.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libgcrypt20 | 1.8.7-6 1.10.1-3 1.11.0-7 | |
Libgcrypt | <=1.7.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The impact of CVE-2017-9526 is that an attacker can recover long-term secret keys if they learn the EdDSA session key through side-channel attacks during the signing process.
Libgcrypt versions prior to 1.7.7 are affected by CVE-2017-9526.
To mitigate CVE-2017-9526, update Libgcrypt to version 1.8.7-6 or later, or 1.10.1-3 or later, or 1.11.0-7 or later.
Libgcrypt 1.7.7 introduced changes to store the EdDSA session key in secure memory to prevent side-channel attacks.
Yes, exploitation of CVE-2017-9526 is relatively easy for attackers who can monitor the signing process.