{"id":"CVE-2015-7511","details":"Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.","modified":"2026-01-27T04:15:08.490529Z","published":"2016-04-19T21:59:03Z","withdrawn":"2026-01-27T04:15:08.490529Z","related":["MGASA-2016-0072","SUSE-SU-2016:1089-1","SUSE-SU-2017:2699-1","SUSE-SU-2017:2700-1","openSUSE-SU-2024:10037-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3474"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3478"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2896-1"},{"type":"ADVISORY","url":"https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201610-04"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html"},{"type":"WEB","url":"http://www.cs.tau.ac.IL/~tromer/ecdh/"},{"type":"WEB","url":"http://www.securityfocus.com/bid/83253"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG/"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}