Lucene search

K
amazonAmazonALAS2-2021-1629
HistoryApr 20, 2021 - 5:55 p.m.

Important: nettle

2021-04-2017:55:00
alas.aws.amazon.com
28
nettle
signature verification
gost dsa
eddsa
ecdsa
elliptic curve cryptography
ecc
out-of-range scalers
cve-2021-20305
amazon linux 2
yum update
security vulnerability

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.2

Confidence

High

EPSS

0.01

Percentile

83.4%

Issue Overview:

A flaw was found in Nettle, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2021-20305)

Affected Packages:

nettle

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update nettle to update your system.

New Packages:

aarch64:  
    nettle-2.7.1-9.amzn2.aarch64  
    nettle-devel-2.7.1-9.amzn2.aarch64  
    nettle-debuginfo-2.7.1-9.amzn2.aarch64  
  
i686:  
    nettle-2.7.1-9.amzn2.i686  
    nettle-devel-2.7.1-9.amzn2.i686  
    nettle-debuginfo-2.7.1-9.amzn2.i686  
  
src:  
    nettle-2.7.1-9.amzn2.src  
  
x86_64:  
    nettle-2.7.1-9.amzn2.x86_64  
    nettle-devel-2.7.1-9.amzn2.x86_64  
    nettle-debuginfo-2.7.1-9.amzn2.x86_64  

Additional References

Red Hat: CVE-2021-20305

Mitre: CVE-2021-20305

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.2

Confidence

High

EPSS

0.01

Percentile

83.4%