Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-16869 (GCVE-0-2018-16869)
Vulnerability from cvelistv5
Published
2018-12-03 14:00
Modified
2024-08-05 10:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
References
► | URL | Tags | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:32:54.115Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "106092", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106092" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://cat.eyalro.net/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "nettle", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-203", "description": "CWE-203", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-04T18:00:57", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "106092", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106092" }, { "tags": [ "x_refsource_MISC" ], "url": "http://cat.eyalro.net/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-16869", "datePublished": "2018-12-03T14:00:00", "dateReserved": "2018-09-11T00:00:00", "dateUpdated": "2024-08-05T10:32:54.115Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-16869\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2018-12-03T14:29:00.380\",\"lastModified\":\"2024-11-21T03:53:29.400\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado un ataque de or\u00e1culo de relleno basado en canales laterales de tipo Bleichenbacher en la manera en la que nettle maneja la conversi\u00f3n endian de los datos PKCS#1 v1.5 descifrados de un cifrado RSA. Un atacante que sea capaz de ejecutar un proceso en el mismo n\u00facleo f\u00edsico que el proceso v\u00edctima podr\u00eda usar este fallo para extraer texto plano o, en algunos casos, desactualizar algunas conexiones TLS a un servidor vulnerable.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N\",\"baseScore\":5.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.5,\"impactScore\":4.7}],\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.3,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":3.3,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-203\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-203\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.4\",\"matchCriteriaId\":\"9516F0DE-4645-415E-AB2F-A5C81759B552\"}]}]}],\"references\":[{\"url\":\"http://cat.eyalro.net/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/106092\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://cat.eyalro.net/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/106092\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]}]}}" } }
opensuse-su-2024:10962-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libhogweed6-3.7.3-1.2 on GA media
Notes
Title of the patch
libhogweed6-3.7.3-1.2 on GA media
Description of the patch
These are all security issues fixed in the libhogweed6-3.7.3-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10962
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libhogweed6-3.7.3-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libhogweed6-3.7.3-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10962", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10962-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16869 page", "url": "https://www.suse.com/security/cve/CVE-2018-16869/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20305 page", "url": "https://www.suse.com/security/cve/CVE-2021-20305/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3580 page", "url": "https://www.suse.com/security/cve/CVE-2021-3580/" } ], "title": "libhogweed6-3.7.3-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10962-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libhogweed6-3.7.3-1.2.aarch64", "product": { "name": "libhogweed6-3.7.3-1.2.aarch64", "product_id": "libhogweed6-3.7.3-1.2.aarch64" } }, { "category": "product_version", "name": "libhogweed6-32bit-3.7.3-1.2.aarch64", "product": { "name": "libhogweed6-32bit-3.7.3-1.2.aarch64", "product_id": "libhogweed6-32bit-3.7.3-1.2.aarch64" } }, { "category": "product_version", "name": "libnettle-devel-3.7.3-1.2.aarch64", "product": { "name": "libnettle-devel-3.7.3-1.2.aarch64", "product_id": "libnettle-devel-3.7.3-1.2.aarch64" } }, { "category": "product_version", "name": "libnettle-devel-32bit-3.7.3-1.2.aarch64", "product": { "name": "libnettle-devel-32bit-3.7.3-1.2.aarch64", "product_id": "libnettle-devel-32bit-3.7.3-1.2.aarch64" } }, { "category": "product_version", "name": "libnettle8-3.7.3-1.2.aarch64", "product": { "name": "libnettle8-3.7.3-1.2.aarch64", "product_id": "libnettle8-3.7.3-1.2.aarch64" } }, { "category": "product_version", "name": "libnettle8-32bit-3.7.3-1.2.aarch64", "product": { "name": "libnettle8-32bit-3.7.3-1.2.aarch64", "product_id": "libnettle8-32bit-3.7.3-1.2.aarch64" } }, { "category": "product_version", "name": "nettle-3.7.3-1.2.aarch64", "product": { "name": "nettle-3.7.3-1.2.aarch64", "product_id": "nettle-3.7.3-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libhogweed6-3.7.3-1.2.ppc64le", "product": { "name": "libhogweed6-3.7.3-1.2.ppc64le", "product_id": "libhogweed6-3.7.3-1.2.ppc64le" } }, { "category": "product_version", "name": "libhogweed6-32bit-3.7.3-1.2.ppc64le", "product": { "name": "libhogweed6-32bit-3.7.3-1.2.ppc64le", "product_id": "libhogweed6-32bit-3.7.3-1.2.ppc64le" } }, { "category": "product_version", "name": "libnettle-devel-3.7.3-1.2.ppc64le", "product": { "name": "libnettle-devel-3.7.3-1.2.ppc64le", "product_id": "libnettle-devel-3.7.3-1.2.ppc64le" } }, { "category": "product_version", "name": "libnettle-devel-32bit-3.7.3-1.2.ppc64le", "product": { "name": "libnettle-devel-32bit-3.7.3-1.2.ppc64le", "product_id": "libnettle-devel-32bit-3.7.3-1.2.ppc64le" } }, { "category": "product_version", "name": "libnettle8-3.7.3-1.2.ppc64le", "product": { "name": "libnettle8-3.7.3-1.2.ppc64le", "product_id": "libnettle8-3.7.3-1.2.ppc64le" } }, { "category": "product_version", "name": "libnettle8-32bit-3.7.3-1.2.ppc64le", "product": { "name": "libnettle8-32bit-3.7.3-1.2.ppc64le", "product_id": "libnettle8-32bit-3.7.3-1.2.ppc64le" } }, { "category": "product_version", "name": "nettle-3.7.3-1.2.ppc64le", "product": { "name": "nettle-3.7.3-1.2.ppc64le", "product_id": "nettle-3.7.3-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libhogweed6-3.7.3-1.2.s390x", "product": { "name": "libhogweed6-3.7.3-1.2.s390x", "product_id": "libhogweed6-3.7.3-1.2.s390x" } }, { "category": "product_version", "name": "libhogweed6-32bit-3.7.3-1.2.s390x", "product": { "name": "libhogweed6-32bit-3.7.3-1.2.s390x", "product_id": "libhogweed6-32bit-3.7.3-1.2.s390x" } }, { "category": "product_version", "name": "libnettle-devel-3.7.3-1.2.s390x", "product": { "name": "libnettle-devel-3.7.3-1.2.s390x", "product_id": "libnettle-devel-3.7.3-1.2.s390x" } }, { "category": "product_version", "name": "libnettle-devel-32bit-3.7.3-1.2.s390x", "product": { "name": "libnettle-devel-32bit-3.7.3-1.2.s390x", "product_id": "libnettle-devel-32bit-3.7.3-1.2.s390x" } }, { "category": "product_version", "name": "libnettle8-3.7.3-1.2.s390x", "product": { "name": "libnettle8-3.7.3-1.2.s390x", "product_id": "libnettle8-3.7.3-1.2.s390x" } }, { "category": "product_version", "name": "libnettle8-32bit-3.7.3-1.2.s390x", "product": { "name": "libnettle8-32bit-3.7.3-1.2.s390x", "product_id": "libnettle8-32bit-3.7.3-1.2.s390x" } }, { "category": "product_version", "name": "nettle-3.7.3-1.2.s390x", "product": { "name": "nettle-3.7.3-1.2.s390x", "product_id": "nettle-3.7.3-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libhogweed6-3.7.3-1.2.x86_64", "product": { "name": "libhogweed6-3.7.3-1.2.x86_64", "product_id": "libhogweed6-3.7.3-1.2.x86_64" } }, { "category": "product_version", "name": "libhogweed6-32bit-3.7.3-1.2.x86_64", "product": { "name": "libhogweed6-32bit-3.7.3-1.2.x86_64", "product_id": "libhogweed6-32bit-3.7.3-1.2.x86_64" } }, { "category": "product_version", "name": "libnettle-devel-3.7.3-1.2.x86_64", "product": { "name": "libnettle-devel-3.7.3-1.2.x86_64", "product_id": "libnettle-devel-3.7.3-1.2.x86_64" } }, { "category": "product_version", "name": "libnettle-devel-32bit-3.7.3-1.2.x86_64", "product": { "name": "libnettle-devel-32bit-3.7.3-1.2.x86_64", "product_id": "libnettle-devel-32bit-3.7.3-1.2.x86_64" } }, { "category": "product_version", "name": "libnettle8-3.7.3-1.2.x86_64", "product": { "name": "libnettle8-3.7.3-1.2.x86_64", "product_id": "libnettle8-3.7.3-1.2.x86_64" } }, { "category": "product_version", "name": "libnettle8-32bit-3.7.3-1.2.x86_64", "product": { "name": "libnettle8-32bit-3.7.3-1.2.x86_64", "product_id": "libnettle8-32bit-3.7.3-1.2.x86_64" } }, { "category": "product_version", "name": "nettle-3.7.3-1.2.x86_64", "product": { "name": "nettle-3.7.3-1.2.x86_64", "product_id": "nettle-3.7.3-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libhogweed6-3.7.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64" }, "product_reference": "libhogweed6-3.7.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libhogweed6-3.7.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le" }, "product_reference": "libhogweed6-3.7.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libhogweed6-3.7.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x" }, "product_reference": "libhogweed6-3.7.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libhogweed6-3.7.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64" }, "product_reference": "libhogweed6-3.7.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libhogweed6-32bit-3.7.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64" }, "product_reference": "libhogweed6-32bit-3.7.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libhogweed6-32bit-3.7.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le" }, "product_reference": "libhogweed6-32bit-3.7.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libhogweed6-32bit-3.7.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x" }, "product_reference": "libhogweed6-32bit-3.7.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libhogweed6-32bit-3.7.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64" }, "product_reference": "libhogweed6-32bit-3.7.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle-devel-3.7.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64" }, "product_reference": "libnettle-devel-3.7.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle-devel-3.7.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le" }, "product_reference": "libnettle-devel-3.7.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle-devel-3.7.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x" }, "product_reference": "libnettle-devel-3.7.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle-devel-3.7.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64" }, "product_reference": "libnettle-devel-3.7.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle-devel-32bit-3.7.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64" }, "product_reference": "libnettle-devel-32bit-3.7.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle-devel-32bit-3.7.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le" }, "product_reference": "libnettle-devel-32bit-3.7.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle-devel-32bit-3.7.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x" }, "product_reference": "libnettle-devel-32bit-3.7.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle-devel-32bit-3.7.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64" }, "product_reference": "libnettle-devel-32bit-3.7.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle8-3.7.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64" }, "product_reference": "libnettle8-3.7.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle8-3.7.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le" }, "product_reference": "libnettle8-3.7.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle8-3.7.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x" }, "product_reference": "libnettle8-3.7.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle8-3.7.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64" }, "product_reference": "libnettle8-3.7.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle8-32bit-3.7.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64" }, "product_reference": "libnettle8-32bit-3.7.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle8-32bit-3.7.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le" }, "product_reference": "libnettle8-32bit-3.7.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle8-32bit-3.7.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x" }, "product_reference": "libnettle8-32bit-3.7.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle8-32bit-3.7.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64" }, "product_reference": "libnettle8-32bit-3.7.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nettle-3.7.3-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64" }, "product_reference": "nettle-3.7.3-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nettle-3.7.3-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le" }, "product_reference": "nettle-3.7.3-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nettle-3.7.3-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x" }, "product_reference": "nettle-3.7.3-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nettle-3.7.3-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64" }, "product_reference": "nettle-3.7.3-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16869", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16869" } ], "notes": [ { "category": "general", "text": "A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x", "openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16869", "url": "https://www.suse.com/security/cve/CVE-2018-16869" }, { "category": "external", "summary": "SUSE Bug 1117951 for CVE-2018-16869", "url": "https://bugzilla.suse.com/1117951" }, { "category": "external", "summary": "SUSE Bug 1118086 for CVE-2018-16869", "url": "https://bugzilla.suse.com/1118086" }, { "category": "external", "summary": "SUSE Bug 1118087 for CVE-2018-16869", "url": "https://bugzilla.suse.com/1118087" }, { "category": "external", "summary": "SUSE Bug 1134856 for CVE-2018-16869", "url": "https://bugzilla.suse.com/1134856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x", "openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x", "openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-16869" }, { "cve": "CVE-2021-20305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20305" } ], "notes": [ { "category": "general", "text": "A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA \u0026 ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x", "openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20305", "url": "https://www.suse.com/security/cve/CVE-2021-20305" }, { "category": "external", "summary": "SUSE Bug 1183835 for CVE-2021-20305", "url": "https://bugzilla.suse.com/1183835" }, { "category": "external", "summary": "SUSE Bug 1184401 for CVE-2021-20305", "url": "https://bugzilla.suse.com/1184401" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x", "openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x", "openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-20305" }, { "cve": "CVE-2021-3580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3580" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x", "openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3580", "url": "https://www.suse.com/security/cve/CVE-2021-3580" }, { "category": "external", "summary": "SUSE Bug 1187060 for CVE-2021-3580", "url": "https://bugzilla.suse.com/1187060" }, { "category": "external", "summary": "SUSE Bug 1187892 for CVE-2021-3580", "url": "https://bugzilla.suse.com/1187892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x", "openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.s390x", "openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2.x86_64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.aarch64", "openSUSE Tumbleweed:nettle-3.7.3-1.2.ppc64le", "openSUSE Tumbleweed:nettle-3.7.3-1.2.s390x", "openSUSE Tumbleweed:nettle-3.7.3-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3580" } ] }
gsd-2018-16869
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-16869", "description": "A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.", "id": "GSD-2018-16869", "references": [ "https://www.suse.com/security/cve/CVE-2018-16869.html", "https://ubuntu.com/security/CVE-2018-16869", "https://advisories.mageia.org/CVE-2018-16869.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-16869" ], "details": "A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.", "id": "GSD-2018-16869", "modified": "2023-12-13T01:22:26.275549Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16869", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "nettle", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server." } ] }, "impact": { "cvss": [ { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-203", "lang": "eng", "value": "CWE-203" } ] } ] }, "references": { "reference_data": [ { "name": "http://cat.eyalro.net/", "refsource": "MISC", "url": "http://cat.eyalro.net/" }, { "name": "http://www.securityfocus.com/bid/106092", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/106092" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.4", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16869" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-203" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869" }, { "name": "http://cat.eyalro.net/", "refsource": "MISC", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "http://cat.eyalro.net/" }, { "name": "106092", "refsource": "BID", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106092" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 4.7 } }, "lastModifiedDate": "2023-02-03T14:25Z", "publishedDate": "2018-12-03T14:29Z" } } }
ghsa-575w-jrpq-q9xv
Vulnerability from github
Published
2022-05-13 01:12
Modified
2022-05-13 01:12
Severity ?
VLAI Severity ?
Details
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
{ "affected": [], "aliases": [ "CVE-2018-16869" ], "database_specific": { "cwe_ids": [ "CWE-203" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-12-03T14:29:00Z", "severity": "MODERATE" }, "details": "A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.", "id": "GHSA-575w-jrpq-q9xv", "modified": "2022-05-13T01:12:24Z", "published": "2022-05-13T01:12:24Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16869" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869" }, { "type": "WEB", "url": "http://cat.eyalro.net" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/106092" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N", "type": "CVSS_V3" } ] }
fkie_cve-2018-16869
Vulnerability from fkie_nvd
Published
2018-12-03 14:29
Modified
2024-11-21 03:53
Severity ?
Summary
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://cat.eyalro.net/ | Technical Description, Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/106092 | Broken Link, Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://cat.eyalro.net/ | Technical Description, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106092 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869 | Issue Tracking, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
nettle_project | nettle | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*", "matchCriteriaId": "9516F0DE-4645-415E-AB2F-A5C81759B552", "versionEndIncluding": "3.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server." }, { "lang": "es", "value": "Se ha detectado un ataque de or\u00e1culo de relleno basado en canales laterales de tipo Bleichenbacher en la manera en la que nettle maneja la conversi\u00f3n endian de los datos PKCS#1 v1.5 descifrados de un cifrado RSA. Un atacante que sea capaz de ejecutar un proceso en el mismo n\u00facleo f\u00edsico que el proceso v\u00edctima podr\u00eda usar este fallo para extraer texto plano o, en algunos casos, desactualizar algunas conexiones TLS a un servidor vulnerable." } ], "id": "CVE-2018-16869", "lastModified": "2024-11-21T03:53:29.400", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 0.3, "impactScore": 4.0, "source": "secalert@redhat.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-03T14:29:00.380", "references": [ { "source": "secalert@redhat.com", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "http://cat.eyalro.net/" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106092" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "http://cat.eyalro.net/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2018:4193-1
Vulnerability from csaf_suse
Published
2018-12-19 12:53
Modified
2018-12-19 12:53
Summary
Security update for libnettle
Notes
Title of the patch
Security update for libnettle
Description of the patch
This update for libnettle fixes the following issues:
Security issues fixed:
- CVE-2018-16869: Fixed a leaky data conversion exposing a manager oracle (bsc#1118086)
Patchnames
SUSE-SLE-Module-Basesystem-15-2018-2986,SUSE-SLE-Module-Desktop-Applications-15-2018-2986,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2986
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for libnettle", "title": "Title of the patch" }, { "category": "description", "text": "This update for libnettle fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-16869: Fixed a leaky data conversion exposing a manager oracle (bsc#1118086)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Basesystem-15-2018-2986,SUSE-SLE-Module-Desktop-Applications-15-2018-2986,SUSE-SLE-Module-Development-Tools-OBS-15-2018-2986", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_4193-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:4193-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20184193-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:4193-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-December/004985.html" }, { "category": "self", "summary": "SUSE Bug 1118086", "url": "https://bugzilla.suse.com/1118086" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16869 page", "url": "https://www.suse.com/security/cve/CVE-2018-16869/" } ], "title": "Security update for libnettle", "tracking": { "current_release_date": "2018-12-19T12:53:27Z", "generator": { "date": "2018-12-19T12:53:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:4193-1", "initial_release_date": "2018-12-19T12:53:27Z", "revision_history": [ { "date": "2018-12-19T12:53:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libhogweed4-3.4-4.3.1.aarch64", "product": { "name": "libhogweed4-3.4-4.3.1.aarch64", "product_id": "libhogweed4-3.4-4.3.1.aarch64" } }, { "category": "product_version", "name": "libnettle-devel-3.4-4.3.1.aarch64", "product": { "name": "libnettle-devel-3.4-4.3.1.aarch64", "product_id": "libnettle-devel-3.4-4.3.1.aarch64" } }, { "category": "product_version", "name": "libnettle6-3.4-4.3.1.aarch64", "product": { "name": "libnettle6-3.4-4.3.1.aarch64", "product_id": "libnettle6-3.4-4.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libhogweed4-3.4-4.3.1.ppc64le", "product": { "name": "libhogweed4-3.4-4.3.1.ppc64le", "product_id": "libhogweed4-3.4-4.3.1.ppc64le" } }, { "category": "product_version", "name": "libnettle-devel-3.4-4.3.1.ppc64le", "product": { "name": "libnettle-devel-3.4-4.3.1.ppc64le", "product_id": "libnettle-devel-3.4-4.3.1.ppc64le" } }, { "category": "product_version", "name": "libnettle6-3.4-4.3.1.ppc64le", "product": { "name": "libnettle6-3.4-4.3.1.ppc64le", "product_id": "libnettle6-3.4-4.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libhogweed4-3.4-4.3.1.s390x", "product": { "name": "libhogweed4-3.4-4.3.1.s390x", "product_id": "libhogweed4-3.4-4.3.1.s390x" } }, { "category": "product_version", "name": "libnettle-devel-3.4-4.3.1.s390x", "product": { "name": "libnettle-devel-3.4-4.3.1.s390x", "product_id": "libnettle-devel-3.4-4.3.1.s390x" } }, { "category": "product_version", "name": "libnettle6-3.4-4.3.1.s390x", "product": { "name": "libnettle6-3.4-4.3.1.s390x", "product_id": "libnettle6-3.4-4.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libhogweed4-3.4-4.3.1.x86_64", "product": { "name": "libhogweed4-3.4-4.3.1.x86_64", "product_id": "libhogweed4-3.4-4.3.1.x86_64" } }, { "category": "product_version", "name": "libnettle-devel-3.4-4.3.1.x86_64", "product": { "name": "libnettle-devel-3.4-4.3.1.x86_64", "product_id": "libnettle-devel-3.4-4.3.1.x86_64" } }, { "category": "product_version", "name": "libnettle6-3.4-4.3.1.x86_64", "product": { "name": "libnettle6-3.4-4.3.1.x86_64", "product_id": "libnettle6-3.4-4.3.1.x86_64" } }, { "category": "product_version", "name": "libhogweed4-32bit-3.4-4.3.1.x86_64", "product": { "name": "libhogweed4-32bit-3.4-4.3.1.x86_64", "product_id": "libhogweed4-32bit-3.4-4.3.1.x86_64" } }, { "category": "product_version", "name": "libnettle6-32bit-3.4-4.3.1.x86_64", "product": { "name": "libnettle6-32bit-3.4-4.3.1.x86_64", "product_id": "libnettle6-32bit-3.4-4.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Desktop Applications 15", "product": { "name": "SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-desktop-applications:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libhogweed4-3.4-4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.aarch64" }, "product_reference": "libhogweed4-3.4-4.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "libhogweed4-3.4-4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.ppc64le" }, "product_reference": "libhogweed4-3.4-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "libhogweed4-3.4-4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.s390x" }, "product_reference": "libhogweed4-3.4-4.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "libhogweed4-3.4-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.x86_64" }, "product_reference": "libhogweed4-3.4-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle-devel-3.4-4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.aarch64" }, "product_reference": "libnettle-devel-3.4-4.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle-devel-3.4-4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.ppc64le" }, "product_reference": "libnettle-devel-3.4-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle-devel-3.4-4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.s390x" }, "product_reference": "libnettle-devel-3.4-4.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle-devel-3.4-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.x86_64" }, "product_reference": "libnettle-devel-3.4-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle6-3.4-4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.aarch64" }, "product_reference": "libnettle6-3.4-4.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle6-3.4-4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.ppc64le" }, "product_reference": "libnettle6-3.4-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle6-3.4-4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.s390x" }, "product_reference": "libnettle6-3.4-4.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle6-3.4-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.x86_64" }, "product_reference": "libnettle6-3.4-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "libhogweed4-32bit-3.4-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libhogweed4-32bit-3.4-4.3.1.x86_64" }, "product_reference": "libhogweed4-32bit-3.4-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "libnettle6-32bit-3.4-4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15:libnettle6-32bit-3.4-4.3.1.x86_64" }, "product_reference": "libnettle6-32bit-3.4-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16869", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16869" } ], "notes": [ { "category": "general", "text": "A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libhogweed4-32bit-3.4-4.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libnettle6-32bit-3.4-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16869", "url": "https://www.suse.com/security/cve/CVE-2018-16869" }, { "category": "external", "summary": "SUSE Bug 1117951 for CVE-2018-16869", "url": "https://bugzilla.suse.com/1117951" }, { "category": "external", "summary": "SUSE Bug 1118086 for CVE-2018-16869", "url": "https://bugzilla.suse.com/1118086" }, { "category": "external", "summary": "SUSE Bug 1118087 for CVE-2018-16869", "url": "https://bugzilla.suse.com/1118087" }, { "category": "external", "summary": "SUSE Bug 1134856 for CVE-2018-16869", "url": "https://bugzilla.suse.com/1134856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libhogweed4-32bit-3.4-4.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libnettle6-32bit-3.4-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libhogweed4-3.4-4.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libnettle-devel-3.4-4.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libnettle6-3.4-4.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libhogweed4-32bit-3.4-4.3.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15:libnettle6-32bit-3.4-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-19T12:53:27Z", "details": "moderate" } ], "title": "CVE-2018-16869" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…