It was discovered that Nettle incorrectly mitigated certain timing side-channel attacks. A remote attacker could possibly use this flaw to recover private keys.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.7.1-1ubuntu0.2", "binary_name": "libhogweed2" }, { "binary_version": "2.7.1-1ubuntu0.2", "binary_name": "libhogweed2-dbgsym" }, { "binary_version": "2.7.1-1ubuntu0.2", "binary_name": "libnettle4" }, { "binary_version": "2.7.1-1ubuntu0.2", "binary_name": "libnettle4-dbgsym" }, { "binary_version": "2.7.1-1ubuntu0.2", "binary_name": "nettle-bin" }, { "binary_version": "2.7.1-1ubuntu0.2", "binary_name": "nettle-bin-dbgsym" }, { "binary_version": "2.7.1-1ubuntu0.2", "binary_name": "nettle-dbg" }, { "binary_version": "2.7.1-1ubuntu0.2", "binary_name": "nettle-dev" }, { "binary_version": "2.7.1-1ubuntu0.2", "binary_name": "nettle-dev-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "3.2-1ubuntu0.16.04.1", "binary_name": "libhogweed4" }, { "binary_version": "3.2-1ubuntu0.16.04.1", "binary_name": "libhogweed4-dbgsym" }, { "binary_version": "3.2-1ubuntu0.16.04.1", "binary_name": "libnettle6" }, { "binary_version": "3.2-1ubuntu0.16.04.1", "binary_name": "libnettle6-dbgsym" }, { "binary_version": "3.2-1ubuntu0.16.04.1", "binary_name": "nettle-bin" }, { "binary_version": "3.2-1ubuntu0.16.04.1", "binary_name": "nettle-bin-dbgsym" }, { "binary_version": "3.2-1ubuntu0.16.04.1", "binary_name": "nettle-dbg" }, { "binary_version": "3.2-1ubuntu0.16.04.1", "binary_name": "nettle-dev" }, { "binary_version": "3.2-1ubuntu0.16.04.1", "binary_name": "nettle-dev-dbgsym" } ] }