• [gentoo-announce] [ GLSA 202401-24 ] Nettle: Denial of Service

    From glsamaker@gentoo.org@21:1/5 to All on Tue Jan 16 14:50:01 2024
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202401-24
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Normal
    Title: Nettle: Denial of Service
    Date: January 16, 2024
    Bugs: #806839, #907673
    ID: 202401-24

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple denial of service vulnerabilities have been discovered in
    Nettle.

    Background
    ==========

    Nettle is a cryptographic library that is designed to fit easily in
    almost any context: In cryptographic toolkits for object-oriented
    languages, such as C++, Python, or Pike, in applications like lsh or
    GnuPG, or even in kernel space.

    Affected packages
    =================

    Package Vulnerable Unaffected
    --------------- ------------ ------------
    dev-libs/nettle < 3.9.1 >= 3.9.1

    Description
    ===========

    Multiple vulnerabilities have been discovered in Nettle. Please review
    the CVE identifiers referenced below for details.

    Impact
    ======

    A flaw was found in the way nettle's RSA decryption functions handled
    specially crafted ciphertext. An attacker could use this flaw to provide
    a manipulated ciphertext leading to application crash and denial of
    service.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Nettle users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=dev-libs/nettle-3.9.1"

    References
    ==========

    [ 1 ] CVE-2021-3580
    https://nvd.nist.gov/vuln/detail/CVE-2021-3580
    [ 2 ] CVE-2023-36660
    https://nvd.nist.gov/vuln/detail/CVE-2023-36660

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202401-24

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2024 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmWmiBYACgkQFMQkOaVy +9lBWA/8CHcy10y+13B2x5JFVS4uRRPYBxA6ZcJ+554I1yZRm902rjgU04y1yX0I +2dKMR7MxZLjk0xWir3mVug9FlxDaPgoxchfalZmRaaZ3lzUnSUxNQ0kuFYNQKI9 9QsvZPk113iJNMF6XI/p0fKkucSJ01aJ97vPiCIiMN6bDhmHg7dwi54iM+J0ETO0 Y5GoUzBjMNJVMdyYluiiNYKiJCbb6tEVXADC44NGLAYZxG5HSrNodNCj8qkWDoDI gL0sOnirTUZnUK+dawymkKEZhEsxiMSX+aYB6JV85cUAWu2FeCyeOEXzQvSe0/BZ HPfi5OFSpdQGxjzkxL1njRkdEszJ34fsRpB+pE1LZHGn0CbNuXjDJhtIoJ3aZxmu /91kJ4VC2edpw+RfZx4uXzs/GIbsmXWuxHfjrAp3aRo3o21Mw64MHPr4Ozvqip2Q N6R7RlNc9+ioimqZPUYNCe5tvDEZ490gw5YRWZNZQ3ab3F3aYy01uToOCr6EsL5n sax96RaRj4W1HKvBr7KGrkX8AKNl2lpo8OWt4b/a2PY4OKy2b+3Of8aHuFKNxMO6 sKgcgHCQZmjz1kkGWFonKJpwYLdZEx/6mgP7I25kaNCl40rRJhyLpcKF6UgQSHGX 3ZRtDHbHOTY+wzO/aNxvwKLg66/m3agkGawbOXoYIe3qxKA2lVs=
    =Y14f
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)