<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libhogweed6-3.7.3-1.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10962-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libhogweed6-3.7.3-1.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libhogweed6-3.7.3-1.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10962</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16869/</URL>
      <Description>SUSE CVE CVE-2018-16869 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-20305/</URL>
      <Description>SUSE CVE CVE-2021-20305 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3580/</URL>
      <Description>SUSE CVE CVE-2021-3580 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libhogweed6-3.7.3-1.2">
      <FullProductName ProductID="libhogweed6-3.7.3-1.2">libhogweed6-3.7.3-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libhogweed6-32bit-3.7.3-1.2">
      <FullProductName ProductID="libhogweed6-32bit-3.7.3-1.2">libhogweed6-32bit-3.7.3-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnettle-devel-3.7.3-1.2">
      <FullProductName ProductID="libnettle-devel-3.7.3-1.2">libnettle-devel-3.7.3-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnettle-devel-32bit-3.7.3-1.2">
      <FullProductName ProductID="libnettle-devel-32bit-3.7.3-1.2">libnettle-devel-32bit-3.7.3-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnettle8-3.7.3-1.2">
      <FullProductName ProductID="libnettle8-3.7.3-1.2">libnettle8-3.7.3-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libnettle8-32bit-3.7.3-1.2">
      <FullProductName ProductID="libnettle8-32bit-3.7.3-1.2">libnettle8-32bit-3.7.3-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nettle-3.7.3-1.2">
      <FullProductName ProductID="nettle-3.7.3-1.2">nettle-3.7.3-1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libhogweed6-3.7.3-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libhogweed6-3.7.3-1.2">libhogweed6-3.7.3-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libhogweed6-32bit-3.7.3-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2">libhogweed6-32bit-3.7.3-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnettle-devel-3.7.3-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2">libnettle-devel-3.7.3-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnettle-devel-32bit-3.7.3-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2">libnettle-devel-32bit-3.7.3-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnettle8-3.7.3-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libnettle8-3.7.3-1.2">libnettle8-3.7.3-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libnettle8-32bit-3.7.3-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2">libnettle8-32bit-3.7.3-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nettle-3.7.3-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nettle-3.7.3-1.2">nettle-3.7.3-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.</Note>
    </Notes>
    <CVE>CVE-2018-16869</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libhogweed6-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libnettle8-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nettle-3.7.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16869.html</URL>
        <Description>CVE-2018-16869</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117951</URL>
        <Description>SUSE Bug 1117951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118086</URL>
        <Description>SUSE Bug 1118086</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1118087</URL>
        <Description>SUSE Bug 1118087</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1134856</URL>
        <Description>SUSE Bug 1134856</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA &amp; ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.</Note>
    </Notes>
    <CVE>CVE-2021-20305</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libhogweed6-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libnettle8-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nettle-3.7.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-20305.html</URL>
        <Description>CVE-2021-20305</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183835</URL>
        <Description>SUSE Bug 1183835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184401</URL>
        <Description>SUSE Bug 1184401</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.</Note>
    </Notes>
    <CVE>CVE-2021-3580</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libhogweed6-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libhogweed6-32bit-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libnettle-devel-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libnettle-devel-32bit-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libnettle8-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:libnettle8-32bit-3.7.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:nettle-3.7.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3580.html</URL>
        <Description>CVE-2021-3580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187060</URL>
        <Description>SUSE Bug 1187060</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1187892</URL>
        <Description>SUSE Bug 1187892</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
