Daniel Genkin, Lev Pachmanov, Itamar Pipman and Eran Tromer discovered that Libgcrypt was susceptible to an attack via physical side channels. A local attacker could use this attack to possibly recover private keys.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.5.3-2ubuntu4.3", "binary_name": "libgcrypt11" }, { "binary_version": "1.5.3-2ubuntu4.3", "binary_name": "libgcrypt11-dev" } ] }
{ "ecosystem": "Ubuntu:14.04:LTS", "cves": [ { "id": "CVE-2015-7511", "severity": [ { "score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ] } ] }