CVE-2016-6489

NameCVE-2016-6489
DescriptionThe RSA and DSA decryption code in Nettle makes it easier for attackers to discover private keys via a cache side channel attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-593-1
NVD severitymedium
Debian Bugs832983

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nettle (PTS)stretch3.3-1fixed
buster3.4.1-1fixed
bullseye, sid3.6-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nettlesourcewheezy2.4-3+deb7u1DLA-593-1
nettlesourcejessie2.7.1-5+deb8u2
nettlesource(unstable)3.3-1832983

Notes

https://lists.lysator.liu.se/pipermail/nettle-bugs/2016/003093.html
https://git.lysator.liu.se/nettle/nettle/commit/3fe1d6549765ecfb24f0b80b2ed086fdc818bff3
Original patch had some unintended side effects: https://lists.lysator.liu.se/pipermail/nettle-bugs/2016/003104.html
Cf. https://www.openwall.com/lists/oss-security/2016/07/30/2
Additionally needed: https://git.lysator.liu.se/nettle/nettle/commit/52b9223126b3f997c00d399166c006ae28669068
GnuTLS needs an update when/before src:nettle is fixed to continue working with patched src:nettle for CVE-2016-6489
but not a vulnerability in GnuTLS. Needs https://gitlab.com/gnutls/gnutls/commit/186dc9c2012003587a38d7f4d03edd8da5fe989f

Search for package or bug name: Reporting problems