|
|
Subscribe / Log in / New account

Arch Linux alert ASA-201602-19 (libgcrypt)

From:  Levente Polyak <anthraxx@archlinux.org>
To:  arch-security@archlinux.org
Subject:  [arch-security] [ASA-201602-19] libgcrypt: secret key extraction
Date:  Thu, 25 Feb 2016 00:53:51 +0100
Message-ID:  <56CE428F.6080704@archlinux.org>

Arch Linux Security Advisory ASA-201602-19 ========================================== Severity: High Date : 2016-02-24 CVE-ID : CVE-2015-7511 Package : libgcrypt Type : secret key extraction Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE Summary ======= The package libgcrypt before version 1.6.5-1 is vulnerable to a side-channel attack leading to extraction of secret decryption keys. Resolution ========== Upgrade to 1.6.5-1. # pacman -Syu "libgcrypt>=1.6.5-1" The problem has been fixed upstream in version 1.6.5. Workaround ========== None. Description =========== A vulnerability was found in a way the ECDH encryption algorithm decrypts data. An attacker with a specialized setup can extract the secret decryption key from a target located in an adjacent room within seconds. This is done by measuring the target's electromagnetic emanations. Impact ====== A remote attacker located in an adjacent room is able to extract the secret decryption key by measuring the target's electromagnetic emanations. References ========== https://access.redhat.com/security/cve/CVE-2015-7511 https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/0... https://www.cs.tau.ac.il/~tromer/ecdh/


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds