CVE-2021-20305

Source
https://cve.org/CVERecord?id=CVE-2021-20305
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-20305.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-20305
Downstream
Related
Published
2021-04-05T22:15:12.727Z
Modified
2026-02-16T01:53:44.735612Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA & ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.

References

Affected packages

Git / github.com/python/cpython

Affected ranges

Type
GIT
Repo
https://github.com/python/cpython
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-20305.json"