Bug 1764018 (CVE-2019-13627)
Summary: | CVE-2019-13627 libgcrypt: ECDSA timing attack allowing private key leak | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | msiddiqu |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | cfergeau, erik-fedora, fidencio, huzaifas, kyoshida, marcandre.lureau, mkaplan, rh-spice-bugs, rjones, tmraz |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | libgcrypt 1.8.5 | Doc Type: | If docs needed, set a value |
Doc Text: |
A timing attack was found in the way ECCDSA was implemented in libgcrypt. A man-in-the-middle attacker could use this attack during signature generation to recover the private key. This attack is only feasible when the attacker is local to the machine where the signature is being generated. Attacks over the network or via the internet are not feasible.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-11-04 02:22:43 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1764019, 1764020, 1764021, 1764918 | ||
Bug Blocks: | 1760783 |
Description
msiddiqu
2019-10-22 07:32:56 UTC
Created libgcrypt tracking bugs for this issue: Affects: fedora-all [bug 1764019] Created mingw-libgcrypt tracking bugs for this issue: Affects: epel-7 [bug 1764021] Affects: fedora-all [bug 1764020] Statement: The versions of libgcrypt shipped with Red Hat Enterprise Linux 5, 6 and 7 do not support ECC, therefore they are not affected by this flaw. External References: https://github.com/gpg/libgcrypt/releases/tag/libgcrypt-1.8.5 https://dev.gnupg.org/T4683 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4482 https://access.redhat.com/errata/RHSA-2020:4482 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-13627 |