
MacGPG2 potentially vulnerable to side-channel attack on RSA secret keys CVE-2017-7526
Reported by Victor Hora | July 4th, 2017 @ 06:07 PM | in 2.2.0 (closed)
Hi,
First and foremost: great work on the project folks!
I've noticed the current build is using libgcrypt 1.6.x from last year.
I'm just wondering if a new build / beta should come out with the latest version (1.7.8) of libgcrypt in light of the new a flush+reload side-channel attack on RSA secret keys dubbed "Sliding right into disaster" [1] [2]
"Note that this side-channel attack requires that the attacker
can run arbitrary software on the hardware where the private RSA
key is used.
Allowing execute access to a box with private keys should be
considered
as a game over condition, anyway. Thus in practice there are
easier
ways to access the private keys than to mount this side-channel
attack.
However, on boxes with virtual machines this attack may be used by
one
VM to steal private keys from another VM." [3]
[1] https://eprint.iacr.org/2017/627 [2] https://thehackernews.com/2017/07/gnupg-libgcrypt-rsa-encryption.ht... [3] https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html
Thanks!
Comments and changes to this ticket
-
-
steve July 5th, 2017 @ 11:04 AM
- Title changed from MacGPG2 potentially vulnerable to side-channel attack on RSA secret keys? to MacGPG2 potentially vulnerable to side-channel attack on RSA secret keys CVE-2017-7526
- Tag cleared.
- Importance changed from to Low
-
Mento July 5th, 2017 @ 11:29 AM
- State changed from new to fixed
- Assigned user set to Mento
Fixed in the nightly.
-
steve July 5th, 2017 @ 12:00 PM
- State changed from fixed to verified
macOS 10.12.5
GPG Suite 1925nverified
gpg2 --version
gpg (GnuPG/MacGPG2) 2.1.21
libgcrypt 1.7.8 -
-
steve July 24th, 2017 @ 03:33 PM
- Tag cleared.
-
Please Sign in or create a free account to add a new ticket.
With your very own profile, you can contribute to projects, track your activity, watch tickets, receive and update tickets through your email and much more.
Create your profile
Help contribute to this project by taking a few moments to create your personal profile. Create your profile ยป