The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2016/07/29/7 | mailing list third party advisory patch |
http://www.ubuntu.com/usn/USN-3193-1 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/201706-21 | third party advisory vendor advisory |
https://git.lysator.liu.se/nettle/nettle/commit/3fe1d6549765ecfb24f0b80b2ed086fdc818bff3 | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1362016 | issue tracking vdb entry third party advisory |
https://eprint.iacr.org/2016/596.pdf | technical description |
http://rhn.redhat.com/errata/RHSA-2016-2582.html | vdb entry third party advisory vendor advisory |
https://www.oracle.com/security-alerts/cpuapr2020.html | third party advisory |