A vulnerability in Nettle could lead to a Denial of Service condition.
Package | dev-libs/nettle on all architectures |
---|---|
Affected versions | < 3.7.2 |
Unaffected versions | >= 3.7.2 |
Nettle is a cryptographic library that is designed to fit easily in almost any context: In cryptographic toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like lsh or GnuPG, or even in kernel space.
It was discovered that Nettle incorrectly handled signature verification.
A remote attacker could send a specially crafted valid-looking input signature, possibly resulting in a Denial of Service condition or force an invalid signature.
There is no known workaround at this time.
All Nettle users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/nettle-3.7.2"
Release date
May 26, 2021
Latest revision
May 26, 2021: 1
Severity
low
Exploitable
local, remote
Bugzilla entries