Name | CVE-2016-6489 |
Description | The RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more) |
References | DLA-593-1 |
NVD severity | medium |
Debian Bugs | 832983 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
nettle (PTS) | stretch | 3.3-1 | fixed |
buster | 3.4.1-1 | fixed | |
bullseye | 3.6-2 | fixed | |
sid | 3.7-2.1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
nettle | source | wheezy | 2.4-3+deb7u1 | DLA-593-1 | ||
nettle | source | jessie | 2.7.1-5+deb8u2 | |||
nettle | source | (unstable) | 3.3-1 | 832983 |
https://lists.lysator.liu.se/pipermail/nettle-bugs/2016/003093.html
https://git.lysator.liu.se/nettle/nettle/commit/3fe1d6549765ecfb24f0b80b2ed086fdc818bff3
Original patch had some unintended side effects: https://lists.lysator.liu.se/pipermail/nettle-bugs/2016/003104.html
Cf. https://www.openwall.com/lists/oss-security/2016/07/30/2
Additionally needed: https://git.lysator.liu.se/nettle/nettle/commit/52b9223126b3f997c00d399166c006ae28669068
GnuTLS needs an update when/before src:nettle is fixed to continue working with patched src:nettle for CVE-2016-6489
but not a vulnerability in GnuTLS. Needs https://gitlab.com/gnutls/gnutls/commit/186dc9c2012003587a38d7f4d03edd8da5fe989f