The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.
References
Link | Resource |
---|---|
https://git.lysator.liu.se/nettle/nettle/commit/3fe1d6549765ecfb24f0b80b2ed086fdc818bff3 | Patch Third Party Advisory |
https://eprint.iacr.org/2016/596.pdf | Technical Description |
https://bugzilla.redhat.com/show_bug.cgi?id=1362016 | Issue Tracking Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-3193-1 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/07/29/7 | Mailing List Patch Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2016-2582.html | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201706-21 | Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2020.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2017-04-14 11:59
Updated : 2020-11-16 12:20
NVD link : CVE-2016-6489
Mitre link : CVE-2016-6489
JSON object : View
CWE
CWE-203
Observable Discrepancy
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_hpc_node
- enterprise_linux_workstation
- enterprise_linux_server
nettle_project
- nettle
canonical
- ubuntu_linux