- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202401-24
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Nettle: Denial of Service
Date: January 16, 2024
Bugs: #806839, #907673
ID: 202401-24
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple denial of service vulnerabilities have been discovered in
Nettle.
Background
==========
Nettle is a cryptographic library that is designed to fit easily in
almost any context: In cryptographic toolkits for object-oriented
languages, such as C++, Python, or Pike, in applications like lsh or
GnuPG, or even in kernel space.
Affected packages
=================
Package Vulnerable Unaffected
--------------- ------------ ------------
dev-libs/nettle < 3.9.1 >= 3.9.1
Description
===========
Multiple vulnerabilities have been discovered in Nettle. Please review
the CVE identifiers referenced below for details.
Impact
======
A flaw was found in the way nettle's RSA decryption functions handled
specially crafted ciphertext. An attacker could use this flaw to provide
a manipulated ciphertext leading to application crash and denial of
service.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Nettle users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/nettle-3.9.1"
References
==========
[ 1 ] CVE-2021-3580
https://nvd.nist.gov/vuln/detail/CVE-2021-3580
[ 2 ] CVE-2023-36660
https://nvd.nist.gov/vuln/detail/CVE-2023-36660
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202401-24
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmWmiBYACgkQFMQkOaVy +9lBWA/8CHcy10y+13B2x5JFVS4uRRPYBxA6ZcJ+554I1yZRm902rjgU04y1yX0I +2dKMR7MxZLjk0xWir3mVug9FlxDaPgoxchfalZmRaaZ3lzUnSUxNQ0kuFYNQKI9 9QsvZPk113iJNMF6XI/p0fKkucSJ01aJ97vPiCIiMN6bDhmHg7dwi54iM+J0ETO0 Y5GoUzBjMNJVMdyYluiiNYKiJCbb6tEVXADC44NGLAYZxG5HSrNodNCj8qkWDoDI gL0sOnirTUZnUK+dawymkKEZhEsxiMSX+aYB6JV85cUAWu2FeCyeOEXzQvSe0/BZ HPfi5OFSpdQGxjzkxL1njRkdEszJ34fsRpB+pE1LZHGn0CbNuXjDJhtIoJ3aZxmu /91kJ4VC2edpw+RfZx4uXzs/GIbsmXWuxHfjrAp3aRo3o21Mw64MHPr4Ozvqip2Q N6R7RlNc9+ioimqZPUYNCe5tvDEZ490gw5YRWZNZQ3ab3F3aYy01uToOCr6EsL5n sax96RaRj4W1HKvBr7KGrkX8AKNl2lpo8OWt4b/a2PY4OKy2b+3Of8aHuFKNxMO6 sKgcgHCQZmjz1kkGWFonKJpwYLdZEx/6mgP7I25kaNCl40rRJhyLpcKF6UgQSHGX 3ZRtDHbHOTY+wzO/aNxvwKLg66/m3agkGawbOXoYIe3qxKA2lVs=
=Y14f
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)