Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal and Yuval Yarom discovered that Libgcrypt is prone to a local side-channel attack allowing full key recovery for RSA-1024. See https://eprint.iacr.org/2017/627 for details. For the oldstable distribution (jessie), this problem has been fixed in version 1.6.3-2+deb8u4. For the stable distribution (stretch), this problem has been fixed in version 1.7.6-2+deb9u1. For the testing distribution (buster), this problem has been fixed in version 1.7.8-1. For the unstable distribution (sid), this problem has been fixed in version 1.7.8-1. We recommend that you upgrade your libgcrypt20 packages.
Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal and Yuval Yarom discovered that Libgcrypt is prone to a local side-channel attack allowing full key recovery for RSA-1024.
See https://eprint.iacr.org/2017/627 for details.
For the oldstable distribution (jessie), this problem has been fixed in version 1.6.3-2+deb8u4.
For the stable distribution (stretch), this problem has been fixed in version 1.7.6-2+deb9u1.
For the testing distribution (buster), this problem has been fixed in version 1.7.8-1.
For the unstable distribution (sid), this problem has been fixed in version 1.7.8-1.
We recommend that you upgrade your libgcrypt20 packages.