[3.2] nettle: Miscomputations of elliptic curve scalar multiplications (CVE-2015-8803, CVE-2015-8804, CVE-2015-8805)
CVE-2015-8803, CVE-2015-8805: secp256 calculation bug
Patch: https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d.patch
CVE-2015-8804: miscalculations on secp384 curve
Patch: https://git.lysator.liu.se/nettle/nettle/commit/fa269b6ad06dd13c901dbd84a12e52b918a09cd7.patch
They affect the NIST P-256 and P-384 curves. The P-256 bug is
in the C code and affects multiple architectures. The P-384 bug is in
the assembly code and only affects 64 bit x86.
Fixed In Version:
Nettle 3.2 fixes all three bugs.
References:
http://seclists.org/oss-sec/2016/q1/266
https://lists.lysator.liu.se/pipermail/nettle-bugs/2015/003028.html
https://bugzilla.redhat.com/show\_bug.cgi?id=1304303
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2015-8804
https://bugzilla.redhat.com/show\_bug.cgi?id=CVE-2015-8805
(from redmine: issue id 5168, created on 2016-02-23, closed on 2016-03-01)
- Relations:
- parent #5165 (closed)
- Changesets:
- Revision 775b2507 on 2016-02-25T11:22:06Z:
main/nettle: security upgrade to 3.2 (CVE-2015-8803, CVE-2015-8804, CVE-2015-8805). Fixes #5168
https://lists.gnu.org/archive/html/info-gnu/2016-01/msg00006.html