Nettle: Denial of service — GLSA 202105-31

A vulnerability in Nettle could lead to a Denial of Service condition.

Affected packages

dev-libs/nettle on all architectures
Affected versions < 3.7.2
Unaffected versions >= 3.7.2

Background

Nettle is a cryptographic library that is designed to fit easily in almost any context: In cryptographic toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like lsh or GnuPG, or even in kernel space.

Description

It was discovered that Nettle incorrectly handled signature verification.

Impact

A remote attacker could send a specially crafted valid-looking input signature, possibly resulting in a Denial of Service condition or force an invalid signature.

Workaround

There is no known workaround at this time.

Resolution

All Nettle users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/nettle-3.7.2"
 

References

Release date
May 26, 2021

Latest revision
May 26, 2021: 1

Severity
low

Exploitable
local, remote

Bugzilla entries