Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.debian.org/security/2016/dsa-3478 | vendor advisory |
http://www.ubuntu.com/usn/USN-2896-1 | vendor advisory |
https://security.gentoo.org/glsa/201610-04 | vendor advisory |
https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html | mailing list vendor advisory |
http://www.debian.org/security/2016/dsa-3474 | vendor advisory |
http://www.securityfocus.com/bid/83253 | vdb entry |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG/ | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html | vendor advisory |
http://www.cs.tau.ac.IL/~tromer/ecdh/ |