A timing-based side-channel flaw was found in libgcrypts RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.
Two separate operations in a product require different amounts of time to complete, in a way that is observable to an actor and reveals security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Red Hat Enterprise Linux 9 | RedHat | libgcrypt-0:1.10.0-11.el9 | * |
Red Hat Enterprise Linux 9 | RedHat | libgcrypt-0:1.10.0-11.el9 | * |
Libgcrypt11 | Ubuntu | trusty/esm | * |
Libgcrypt20 | Ubuntu | mantic | * |