Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 590484 (CVE-2016-6489) - <dev-libs/nettle-3.2-r1 : RSA code is vulnerable to cache-timing related attacks
Summary: <dev-libs/nettle-3.2-r1 : RSA code is vulnerable to cache-timing related attacks
Status: RESOLVED FIXED
Alias: CVE-2016-6489
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: A3 [glsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2016-08-04 15:35 UTC by Agostino Sarubbo
Modified: 2017-06-22 17:31 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2016-08-04 15:35:21 UTC
From ${URL} :

A cache-related side channel was found, in nettle-RSA code. An attacker could use a specially crafted RSA or DSA data, which could make the SSL/TLS 
connection suspectible to Man-in-the-Middle attacks:

References:

https://eprint.iacr.org/2016/596.pdf
https://git.lysator.liu.se/nettle/nettle/commit/3fe1d6549765ecfb24f0b80b2ed086fdc818bff3


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Alon Bar-Lev (RETIRED) gentoo-dev 2016-08-04 19:44:19 UTC
This patch was not added as-is in upstream, I cherry-picked the fixes and some more.
Let's give people a chance to test for a few days.
Comment 2 Alon Bar-Lev (RETIRED) gentoo-dev 2016-08-09 21:25:10 UTC
OK, let's stabilize.
Thanks!
Comment 3 Jeroen Roovers (RETIRED) gentoo-dev 2016-08-14 09:24:06 UTC
Stable for HPPA PPC64.
Comment 4 Agostino Sarubbo gentoo-dev 2016-08-18 14:54:08 UTC
amd64 stable
Comment 5 Markus Meier gentoo-dev 2016-08-18 19:32:29 UTC
arm stable
Comment 6 Tobias Klausmann (RETIRED) gentoo-dev 2016-09-02 19:21:54 UTC
Stable on alpha.
Comment 7 Agostino Sarubbo gentoo-dev 2016-09-29 08:42:15 UTC
x86 stable
Comment 8 Agostino Sarubbo gentoo-dev 2016-09-29 09:37:22 UTC
sparc stable
Comment 9 Agostino Sarubbo gentoo-dev 2016-09-29 12:38:08 UTC
ppc stable
Comment 10 Agostino Sarubbo gentoo-dev 2016-09-29 13:30:36 UTC
ia64 stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 11 Yury German Gentoo Infrastructure gentoo-dev 2017-04-19 05:46:38 UTC
Arches, Thank you for your work.
New GLSA Request filed.

Maintainer(s), please drop the vulnerable version(s).
Comment 12 Alon Bar-Lev (RETIRED) gentoo-dev 2017-04-19 06:44:40 UTC
(In reply to Yury German from comment #11)
> Arches, Thank you for your work.
> New GLSA Request filed.
> 
> Maintainer(s), please drop the vulnerable version(s).

Done
Comment 13 Yury German Gentoo Infrastructure gentoo-dev 2017-05-26 23:47:52 UTC
Thank you for clean-up.
Comment 14 GLSAMaker/CVETool Bot gentoo-dev 2017-06-22 17:31:41 UTC
This issue was resolved and addressed in
 GLSA 201706-21 at https://security.gentoo.org/glsa/201706-21
by GLSA coordinator Kristian Fiskerstrand (K_F).