A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "3.4.1-0ubuntu0.18.04.1", "binary_name": "libhogweed4" }, { "binary_version": "3.4.1-0ubuntu0.18.04.1", "binary_name": "libhogweed4-dbgsym" }, { "binary_version": "3.4.1-0ubuntu0.18.04.1", "binary_name": "libnettle6" }, { "binary_version": "3.4.1-0ubuntu0.18.04.1", "binary_name": "libnettle6-dbgsym" }, { "binary_version": "3.4.1-0ubuntu0.18.04.1", "binary_name": "nettle-bin" }, { "binary_version": "3.4.1-0ubuntu0.18.04.1", "binary_name": "nettle-bin-dbgsym" }, { "binary_version": "3.4.1-0ubuntu0.18.04.1", "binary_name": "nettle-dev" } ] }