libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.
https://www.debian.org/security/2017/dsa-3960
https://www.debian.org/security/2017/dsa-3901
https://usn.ubuntu.com/3733-2/
https://usn.ubuntu.com/3733-1/
https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html
https://eprint.iacr.org/2017/627
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526