Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 777615 - <dev-libs/nettle-3.7.2: Error in ECDSA signature verification
Summary: <dev-libs/nettle-3.7.2: Error in ECDSA signature verification
Status: RESOLVED DUPLICATE of bug 780483
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: A3 [glsa? cleanup]
Keywords:
Depends on:
Blocks:
 
Reported: 2021-03-22 00:50 UTC by Sam James
Modified: 2021-05-25 19:59 UTC (History)
1 user (show)

See Also:
Package list:
dev-libs/nettle-3.7.2
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-03-22 00:50:47 UTC
From the 3.7.2 release notes:

	This is a bugfix release, fixing a bug in ECDSA signature
	verification that could lead to a denial of service attack
	(via an assertion failure) or possibly incorrect results. It
	also fixes a few related problems where scalars are required
	to be canonically reduced modulo the ECC group order, but in
	fact may be slightly larger.

	Upgrading to the new version is strongly recommended.

	Even when no assert is triggered in ecdsa_verify, ECC point
	multiplication may get invalid intermediate values as input,
	and produce incorrect results. It's trivial to construct
	alleged signatures that result in invalid intermediate values.
	It appears difficult to construct an alleged signature that
	makes the function misbehave in such a way that an invalid
	signature is accepted as valid, but such attacks can't be
	ruled out without further analysis.

	Thanks to Guido Vranken for setting up the fuzzer tests that
	uncovered this problem.
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-03-22 00:51:01 UTC
Tell us when ready to stable.
Comment 2 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-03-28 05:43:22 UTC
Ping
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-03-28 12:15:20 UTC
x86 done
Comment 4 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-03-28 12:16:04 UTC
amd64 done
Comment 5 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-03-28 14:15:36 UTC
sparc done
Comment 6 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-03-28 18:14:43 UTC
arm64 done
Comment 7 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-03-29 14:49:55 UTC
arm done
Comment 8 Rolf Eike Beer archtester 2021-03-29 19:49:41 UTC
hppa stable
Comment 9 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-03-30 22:06:00 UTC
ppc64 done
Comment 10 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2021-03-30 22:06:14 UTC
ppc done
Comment 11 Agostino Sarubbo gentoo-dev 2021-03-31 14:08:38 UTC
s390 stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 12 NATTkA bot gentoo-dev 2021-03-31 14:09:05 UTC
Resetting sanity check; keywords are not fully specified and arches are not CC-ed.
Comment 13 Thomas Deutschmann gentoo-dev 2021-05-25 19:59:11 UTC

*** This bug has been marked as a duplicate of bug 780483 ***