First published: Tue Apr 19 2016(Updated: )
Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libgcrypt | <=1.6.4 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7511 is classified as a medium severity vulnerability due to its potential for key extraction through electromagnetic emanations.
To mitigate CVE-2015-7511, upgrade Libgcrypt to version 1.6.5 or later, or apply relevant patches provided by your operating system vendor.
CVE-2015-7511 affects Libgcrypt versions prior to 1.6.5 and various Debian and Ubuntu distributions as specified in the vulnerability report.
CVE-2015-7511 can allow physically proximate attackers to extract elliptic-curve Diffie-Hellman keys through electromagnetic leakage.
CVE-2015-7511 specifically impacts Debian and Ubuntu operating systems that use vulnerable versions of Libgcrypt.