vulnerability
CentOS Linux: CVE-2021-20305: Important: nettle security update (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Apr 5, 2021 | Apr 9, 2021 | May 25, 2023 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Apr 5, 2021
Added
Apr 9, 2021
Modified
May 25, 2023
Description
A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.
Solutions
centos-upgrade-gnutlscentos-upgrade-gnutls-ccentos-upgrade-gnutls-c-debuginfocentos-upgrade-gnutls-danecentos-upgrade-gnutls-dane-debuginfocentos-upgrade-gnutls-debuginfocentos-upgrade-gnutls-debugsourcecentos-upgrade-gnutls-develcentos-upgrade-gnutls-utilscentos-upgrade-gnutls-utils-debuginfocentos-upgrade-nettlecentos-upgrade-nettle-debuginfocentos-upgrade-nettle-debugsourcecentos-upgrade-nettle-devel
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.