CVE-2021-20305

A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 24%
VendorProductVersion
nettle_projectnettle
𝑥
< 3.7.2
redhatenterprise_linux
7.0
redhatenterprise_linux
8.0
netappactive_iq_unified_manager
-
netappontap_select_deploy_administration_utility
-
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
nettle
bullseye
3.7.3-1
fixed
bookworm
3.8.1-2
fixed
sid
3.10-1
fixed
trixie
3.10-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
nettle
noble
Fixed 3.7-2.1ubuntu1
released
mantic
Fixed 3.7-2.1ubuntu1
released
lunar
Fixed 3.7-2.1ubuntu1
released
kinetic
Fixed 3.7-2.1ubuntu1
released
jammy
Fixed 3.7-2.1ubuntu1
released
impish
Fixed 3.7-2.1ubuntu1
released
hirsute
Fixed 3.7-2.1ubuntu1
released
groovy
Fixed 3.6-2ubuntu0.1
released
focal
Fixed 3.5.1+really3.5.1-2ubuntu0.1
released
bionic
Fixed 3.4-1ubuntu0.1
released
xenial
Fixed 3.2-1ubuntu0.16.04.2
released
trusty
needed