CVE-2015-7511
Published: April 19, 2016Last modified: August 7, 2025
Description
Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 2 |
| Attack Vector | PHYSICAL |
| Attack complexity | HIGH |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | LOW |
| Integrity impact | NONE |
| Availability impact | NONE |
| Vector | CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | libgcrypt | Not affected (1.10.1-r0) |
| Stream | libgcrypt | Not affected (1.10.2-r2) |
References
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html
- http://www.cs.tau.ac.IL/~tromer/ecdh/
- http://www.debian.org/security/2016/dsa-3474
- http://www.debian.org/security/2016/dsa-3478
- http://www.securityfocus.com/bid/83253
- http://www.ubuntu.com/usn/USN-2896-1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG/
- https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html
- https://security.gentoo.org/glsa/201610-04