A vulnerability was found in a way the ECDH encryption algorithm decrypts data. An attacker with a specialised setup can extract the secret decryption key from a target located in an adjacent room within seconds. This is done by measuring the target's electromagnetic emanations. External reference: http://www.cs.tau.ac.il/~tromer/ecdh/ Upstream announcement: https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html
Created libgcrypt tracking bugs for this issue: Affects: fedora-all [bug 1306185]
Created mingw-libgcrypt tracking bugs for this issue: Affects: fedora-all [bug 1306186] Affects: epel-7 [bug 1306187]
Upstream bug fix: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=88e1358962e902ff1cbec8d53ba3eee46407851a Note: The preferred way to protect against this vulnerability is to update to the new package version.
libgcrypt-1.6.5-1.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
libgcrypt-1.6.5-1.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.