MGASA-2021-0300

Source
https://advisories.mageia.org/MGASA-2021-0300.html
Import Source
https://advisories.mageia.org/MGASA-2021-0300.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0300
Related
Published
2021-06-29T17:31:40Z
Modified
2021-06-29T16:16:06Z
Summary
Updated nettle packages fix security vulnerabilities
Details

Remote crash in RSA decryption via manipulated ciphertext (CVE-2021-3580).

A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation (CVE-2021-20305).

The Mageia 8 nettle package has been updated to version 3.7.3 and the Mageia 7 nettle package has been patched to fix these issues.

References
Credits

Affected packages