CVE-2015-7511
Published: April 19, 2016Last modified: November 9, 2023
Description
Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 2 |
Attack Vector | PHYSICAL |
Attack complexity | HIGH |
Privileges required | NONE |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | LOW |
Integrity impact | NONE |
Availability impact | NONE |
Vector | CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | libgcrypt | Not affected (1.10.1-r0) |
Stream | libgcrypt | Not affected (1.10.2-r2) |
References
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html
- http://www.cs.tau.ac.IL/~tromer/ecdh/
- http://www.debian.org/security/2016/dsa-3474
- http://www.debian.org/security/2016/dsa-3478
- http://www.securityfocus.com/bid/83253
- http://www.ubuntu.com/usn/USN-2896-1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG/
- https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html
- https://security.gentoo.org/glsa/201610-04