ALT-PU-2023-1356-1
Closed vulnerabilities
BDU:2021-02748
Уязвимость функций проверки подписи (ГОСТ DSA, EDDSA и ECDSA) библиотеки Nettle, связанная с недостатками используемых криптографических алгоритмов, позволяющая нарушителю, не прошедшему проверку подлинности, выполнить произвольный код
Modified: 2024-11-21
CVE-2021-20305
A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1942533
- https://bugzilla.redhat.com/show_bug.cgi?id=1942533
- [debian-lts-announce] 20210918 [SECURITY] [DLA 2760-1] nettle security update
- [debian-lts-announce] 20210918 [SECURITY] [DLA 2760-1] nettle security update
- FEDORA-2021-454a0f6f76
- FEDORA-2021-454a0f6f76
- GLSA-202105-31
- GLSA-202105-31
- https://security.netapp.com/advisory/ntap-20211022-0002/
- https://security.netapp.com/advisory/ntap-20211022-0002/
- DSA-4933
- DSA-4933
Modified: 2024-11-21
CVE-2022-2509
A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.
- https://access.redhat.com/security/cve/CVE-2022-2509
- https://access.redhat.com/security/cve/CVE-2022-2509
- [debian-lts-announce] 20220812 [SECURITY] [DLA 3070-1] gnutls28 security update
- [debian-lts-announce] 20220812 [SECURITY] [DLA 3070-1] gnutls28 security update
- FEDORA-2022-5470992bfc
- FEDORA-2022-5470992bfc
- https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
- https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
- DSA-5203
- DSA-5203
Modified: 2025-03-19
CVE-2023-0361
A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.
- https://access.redhat.com/security/cve/CVE-2023-0361
- https://access.redhat.com/security/cve/CVE-2023-0361
- https://github.com/tlsfuzzer/tlsfuzzer/pull/679
- https://github.com/tlsfuzzer/tlsfuzzer/pull/679
- https://gitlab.com/gnutls/gnutls/-/issues/1050
- https://gitlab.com/gnutls/gnutls/-/issues/1050
- [debian-lts-announce] 20230218 [SECURITY] [DLA 3321-1] gnutls28 security update
- [debian-lts-announce] 20230218 [SECURITY] [DLA 3321-1] gnutls28 security update
- FEDORA-2023-1c4a6a47ae
- FEDORA-2023-1c4a6a47ae
- FEDORA-2023-4fc4c33f2b
- FEDORA-2023-4fc4c33f2b
- FEDORA-2023-5b378b82b3
- FEDORA-2023-5b378b82b3
- https://security.netapp.com/advisory/ntap-20230324-0005/
- https://security.netapp.com/advisory/ntap-20230324-0005/
- https://security.netapp.com/advisory/ntap-20230725-0005/
- https://security.netapp.com/advisory/ntap-20230725-0005/