Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2021-20305

Published: 5 April 2021

A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.

Priority

Medium

Cvss 3 Severity Score

8.1

Score breakdown

Status

Package Release Status
nettle
Launchpad, Ubuntu, Debian
bionic
Released (3.4-1ubuntu0.1)
focal
Released (3.5.1+really3.5.1-2ubuntu0.1)
groovy
Released (3.6-2ubuntu0.1)
hirsute
Released (3.7-2.1ubuntu1)
impish
Released (3.7-2.1ubuntu1)
jammy
Released (3.7-2.1ubuntu1)
kinetic
Released (3.7-2.1ubuntu1)
lunar
Released (3.7-2.1ubuntu1)
mantic
Released (3.7-2.1ubuntu1)
trusty Needed

upstream
Released (3.7.2-1)
xenial
Released (3.2-1ubuntu0.16.04.2)
Patches:
upstream: https://git.lysator.liu.se/nettle/nettle/-/commit/a63893791280d441c713293491da97c79c0950fe
upstream: https://git.lysator.liu.se/nettle/nettle/-/commit/971bed6ab4b27014eb23085e8176917e1a096fd5
upstream: https://git.lysator.liu.se/nettle/nettle/-/commit/74ee0e82b6891e090f20723750faeb19064e31b2
upstream: https://git.lysator.liu.se/nettle/nettle/-/commit/51f643eee00e2caa65c8a2f5857f49acdf3ef1ce
upstream: https://git.lysator.liu.se/nettle/nettle/-/commit/401c8d53d8a8cf1e79980e62bda3f946f8e07c14
upstream: https://git.lysator.liu.se/nettle/nettle/-/commit/ae3801a0e5cce276c270973214385c86048d5f7b
upstream: https://git.lysator.liu.se/nettle/nettle/-/commit/63f222c60b03470c0005aa9bc4296fbf585f68b9

Severity score breakdown

Parameter Value
Base score 8.1
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H