A timing based side-channel exists in the libgcrypt RSA implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve successful decryption an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OAEP, and RSASVE.
Created libgcrypt tracking bugs for this issue: Affects: fedora-all [bug 2268271] Created mingw-libgcrypt tracking bugs for this issue: Affects: fedora-all [bug 2268272]
*** This bug has been marked as a duplicate of bug 2245218 ***
This comment was flagged a spam, view the edit history to see the original text if required.