It was discovered that Nettle incorrectly mitigated certain timing side-channel attacks. A remote attacker could possibly use this flaw to recover private keys.
{ "binaries": [ { "binary_name": "libhogweed2", "binary_version": "2.7.1-1ubuntu0.2" }, { "binary_name": "libhogweed2-dbgsym", "binary_version": "2.7.1-1ubuntu0.2" }, { "binary_name": "libnettle4", "binary_version": "2.7.1-1ubuntu0.2" }, { "binary_name": "libnettle4-dbgsym", "binary_version": "2.7.1-1ubuntu0.2" }, { "binary_name": "nettle-bin", "binary_version": "2.7.1-1ubuntu0.2" }, { "binary_name": "nettle-bin-dbgsym", "binary_version": "2.7.1-1ubuntu0.2" }, { "binary_name": "nettle-dbg", "binary_version": "2.7.1-1ubuntu0.2" }, { "binary_name": "nettle-dev", "binary_version": "2.7.1-1ubuntu0.2" }, { "binary_name": "nettle-dev-dbgsym", "binary_version": "2.7.1-1ubuntu0.2" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "libhogweed4", "binary_version": "3.2-1ubuntu0.16.04.1" }, { "binary_name": "libhogweed4-dbgsym", "binary_version": "3.2-1ubuntu0.16.04.1" }, { "binary_name": "libnettle6", "binary_version": "3.2-1ubuntu0.16.04.1" }, { "binary_name": "libnettle6-dbgsym", "binary_version": "3.2-1ubuntu0.16.04.1" }, { "binary_name": "nettle-bin", "binary_version": "3.2-1ubuntu0.16.04.1" }, { "binary_name": "nettle-bin-dbgsym", "binary_version": "3.2-1ubuntu0.16.04.1" }, { "binary_name": "nettle-dbg", "binary_version": "3.2-1ubuntu0.16.04.1" }, { "binary_name": "nettle-dev", "binary_version": "3.2-1ubuntu0.16.04.1" }, { "binary_name": "nettle-dev-dbgsym", "binary_version": "3.2-1ubuntu0.16.04.1" } ], "availability": "No subscription required" }