First published: Mon Aug 01 2016(Updated: )
A cache-related side channel was found in nettle's RSA and DSA decryption code. An attacker could use this flaw to recover the private key, from a co-located virtual-machine instance. References: <a href="https://eprint.iacr.org/2016/596.pdf">https://eprint.iacr.org/2016/596.pdf</a> <a href="https://git.lysator.liu.se/nettle/nettle/commit/3fe1d6549765ecfb24f0b80b2ed086fdc818bff3">https://git.lysator.liu.se/nettle/nettle/commit/3fe1d6549765ecfb24f0b80b2ed086fdc818bff3</a>
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =16.10 | |
Nettle | <3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6489 has been classified as a high severity vulnerability due to the potential for private key recovery.
To fix CVE-2016-6489, update the Nettle library to a version higher than 3.3.
CVE-2016-6489 affects users of Nettle versions up to but not including 3.4 on specific distributions like RHEL 7.0 and several versions of Ubuntu.
An attack exploiting CVE-2016-6489 involves recovering private keys through a cache-related side channel in a virtualized environment.
Yes, CVE-2016-6489 is particularly relevant in cloud environments where multiple virtual machines may share the same physical resources.