{"dataType": "CVE_RECORD", "containers": {"adp": [{"metrics": [{"cvssV3_0": {"scope": "CHANGED", "version": "3.0", "baseScore": 4.7, "attackVector": "PHYSICAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Moderate\"}"}}}], "affected": [{"vendor": "redhat", "product": "nettle", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "nettle-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:7"], "defaultStatus": "affected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2018-16869"}], "descriptions": [{"lang": "en", "value": "A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process could use this flaw extract plain text or, in some cases, downgrade any TLS connections to a vulnerable server."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2018-11-30T00:00:00Z", "x_subShortName": "redhat_7"}}, {"metrics": [{"cvssV3_1": {"scope": "CHANGED", "version": "3.1", "baseScore": 5.7, "attackVector": "PHYSICAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"low\"}"}}}], "affected": [{"vendor": "canonical", "product": "libhogweed4", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4.1-0ubuntu0.18.04.1", "versionType": "custom"}], "platforms": ["bionic"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libnettle6", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4.1-0ubuntu0.18.04.1", "versionType": "custom"}], "platforms": ["bionic"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "nettle-bin", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4.1-0ubuntu0.18.04.1", "versionType": "custom"}], "platforms": ["bionic"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libhogweed2", "platforms": ["trusty"], "defaultStatus": "unknown"}, {"vendor": "canonical", "product": "libnettle4", "platforms": ["trusty"], "defaultStatus": "unknown"}, {"vendor": "canonical", "product": "nettle-bin", "platforms": ["trusty", "xenial"], "defaultStatus": "unknown"}, {"vendor": "canonical", "product": "libhogweed4", "platforms": ["xenial"], "defaultStatus": "unknown"}, {"vendor": "canonical", "product": "libnettle6", "platforms": ["xenial"], "defaultStatus": "unknown"}, {"vendor": "unknown", "product": "unknown", "defaultStatus": "unknown"}], "references": [{"url": "https://ubuntu.com/security/CVE-2018-16869"}, {"url": "https://ubuntu.com/security/notices/USN-4990-1"}, {"url": "https://www.cve.org/CVERecord?id=CVE-2018-16869"}], "descriptions": [{"lang": "en", "value": "A Bleichenbacher type side-channel based padding oracle attack was found inthe way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data.An attacker who is able to run a process on the same physical core as thevictim process, could use this flaw extract plaintext or in some casesdowngrade any TLS connections to a vulnerable server."}, {"lang": "en", "value": "not defined"}], "providerMetadata": {"orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical", "dateUpdated": "2018-12-03T14:29:00Z", "x_subShortName": "canonical"}}, {"metrics": [{"other": {"type": "Unknown", "content": {"data": "{\"description\":\"not yet assigned\"}"}}}], "affected": [{"vendor": "debian", "product": "libhogweed4", "versions": [{"status": "affected", "version": "0", "lessThan": "3.4.1~rc1-1", "versionType": "deb"}], "platforms": ["bookworm", "bullseye", "forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libhogweed4-dbgsym", "versions": [{"status": "affected", "version": "0", "lessThan": "3.4.1~rc1-1", "versionType": "deb"}], "platforms": ["bookworm", "bullseye", "forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libnettle6", "versions": [{"status": "affected", "version": "0", "lessThan": "3.4.1~rc1-1", "versionType": "deb"}], "platforms": ["bookworm", "bullseye", "forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libnettle6-dbgsym", "versions": [{"status": "affected", "version": "0", "lessThan": "3.4.1~rc1-1", "versionType": "deb"}], "platforms": ["bookworm", "bullseye", "forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "nettle-bin", "versions": [{"status": "affected", "version": "0", "lessThan": "3.4.1~rc1-1", "versionType": "deb"}], "platforms": ["bookworm", "bullseye", "forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "nettle-bin-dbgsym", "versions": [{"status": "affected", "version": "0", "lessThan": "3.4.1~rc1-1", "versionType": "deb"}], "platforms": ["bookworm", "bullseye", "forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "nettle-dev", "versions": [{"status": "affected", "version": "0", "lessThan": "3.4.1~rc1-1", "versionType": "deb"}], "platforms": ["bookworm", "bullseye", "forky", "sid", "trixie"], "defaultStatus": "unaffected"}], "references": [{"url": "https://security-tracker.debian.org/tracker/CVE-2018-16869"}], "descriptions": [{"lang": "en", "value": "A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server."}], "providerMetadata": {"orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian", "dateUpdated": "2018-12-03T14:00:00.000Z", "x_subShortName": "debian"}}, {"metrics": [{"other": {"type": "Unknown", "content": {"data": "{\"description\":\"medium\"}"}}}], "affected": [{"vendor": "fedora", "product": "mingw-nettle", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4.1-1.fc28", "versionType": "rpm"}], "platforms": ["cpe:/o:fedoraproject:fedora:28"], "defaultStatus": "unaffected"}, {"vendor": "fedora", "product": "nettle", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4.1-1.fc28", "versionType": "rpm"}], "platforms": ["cpe:/o:fedoraproject:fedora:28"], "defaultStatus": "unaffected"}, {"vendor": "fedora", "product": "mingw-nettle", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4.1-1.fc29", "versionType": "rpm"}], "platforms": ["cpe:/o:fedoraproject:fedora:29"], "defaultStatus": "unaffected"}], "references": [{"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2018-f7d9989c42"}, {"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2019-01afc2352f"}, {"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2019-31015766d1"}], "descriptions": [{"lang": "en", "value": "mingw-nettle: nettle: Leaky data conversion exposing a manager oracle"}, {"lang": "en", "value": "nettle: Leaky data conversion exposing a manager oracle"}], "providerMetadata": {"orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora", "dateUpdated": "2018-12-29T02:24:45Z", "x_subShortName": "fedora"}}, {"metrics": [{"cvssV3_0": {"scope": "CHANGED", "version": "3.0", "baseScore": 4.7, "attackVector": "PHYSICAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Moderate\"}"}}}], "affected": [{"vendor": "redhat", "product": "nettle", "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "nettle-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2018-16869"}], "descriptions": [{"lang": "en", "value": "Red Hat's versions of the associated software have been determined to NOT be affected by CVE-2018-16869."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2018-11-30T00:00:00Z", "x_subShortName": "redhat_8"}}, {"metrics": [{"cvssV3_0": {"scope": "CHANGED", "version": "3.0", "baseScore": 5.3, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Moderate\"}"}}}], "affected": [{"vendor": "suse", "product": "libhogweed6", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.7.3-150400.2.21", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sle-module-basesystem:15:sp4", "cpe:/o:suse:sle_hpc:15:sp4", "cpe:/o:suse:sled:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:suse-manager-proxy:4.3", "cpe:/o:suse:suse-manager-retail-branch-server:4.3"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.7.3-150400.2.21", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sle-module-basesystem:15:sp4", "cpe:/o:suse:sle_hpc:15:sp4", "cpe:/o:suse:sled:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:suse-manager-proxy:4.3", "cpe:/o:suse:suse-manager-retail-branch-server:4.3"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.7.3-150400.2.21", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sle-module-basesystem:15:sp4", "cpe:/o:suse:sle_hpc:15:sp4", "cpe:/o:suse:sled:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:suse-manager-proxy:4.3", "cpe:/o:suse:suse-manager-retail-branch-server:4.3"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.7.3-150400.2.21", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sle-module-basesystem:15:sp4", "cpe:/o:suse:sle_hpc:15:sp4", "cpe:/o:suse:sled:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:suse-manager-proxy:4.3", "cpe:/o:suse:suse-manager-retail-branch-server:4.3"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.7.3-150400.2.21", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sle-module-basesystem:15:sp4", "cpe:/o:suse:sle_hpc:15:sp4", "cpe:/o:suse:sled:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:suse-manager-proxy:4.3", "cpe:/o:suse:suse-manager-retail-branch-server:4.3"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-150700.2.16", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-150700.2.16", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-150700.2.16", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-150700.2.16", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-150700.2.16", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed4", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4-4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:ses:6", "cpe:/o:suse:ses:7", "cpe:/o:suse:ses:7.1", "cpe:/o:suse:sle-module-basesystem:15", "cpe:/o:suse:sle-module-basesystem:15:sp1", "cpe:/o:suse:sle-module-basesystem:15:sp2", "cpe:/o:suse:sle-module-basesystem:15:sp3", "cpe:/o:suse:sle_hpc:15", "cpe:/o:suse:sle_hpc:15:sp1", "cpe:/o:suse:sle_hpc:15:sp2", "cpe:/o:suse:sle_hpc:15:sp3", "cpe:/o:suse:sled:15", "cpe:/o:suse:sled:15:sp1", "cpe:/o:suse:sled:15:sp2", "cpe:/o:suse:sled:15:sp3", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15", "cpe:/o:suse:sles_sap:15:sp1", "cpe:/o:suse:sles_sap:15:sp2", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:suse-manager-proxy:4.0", "cpe:/o:suse:suse-manager-proxy:4.1", "cpe:/o:suse:suse-manager-proxy:4.2", "cpe:/o:suse:suse-manager-retail-branch-server:4.0", "cpe:/o:suse:suse-manager-retail-branch-server:4.1", "cpe:/o:suse:suse-manager-retail-branch-server:4.2"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4-4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:ses:6", "cpe:/o:suse:ses:7", "cpe:/o:suse:ses:7.1", "cpe:/o:suse:sle-module-basesystem:15", "cpe:/o:suse:sle-module-basesystem:15:sp1", "cpe:/o:suse:sle-module-basesystem:15:sp2", "cpe:/o:suse:sle-module-basesystem:15:sp3", "cpe:/o:suse:sle_hpc:15", "cpe:/o:suse:sle_hpc:15:sp1", "cpe:/o:suse:sle_hpc:15:sp2", "cpe:/o:suse:sle_hpc:15:sp3", "cpe:/o:suse:sled:15", "cpe:/o:suse:sled:15:sp1", "cpe:/o:suse:sled:15:sp2", "cpe:/o:suse:sled:15:sp3", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15", "cpe:/o:suse:sles_sap:15:sp1", "cpe:/o:suse:sles_sap:15:sp2", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:suse-manager-proxy:4.0", "cpe:/o:suse:suse-manager-proxy:4.1", "cpe:/o:suse:suse-manager-proxy:4.2", "cpe:/o:suse:suse-manager-retail-branch-server:4.0", "cpe:/o:suse:suse-manager-retail-branch-server:4.1", "cpe:/o:suse:suse-manager-retail-branch-server:4.2"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle6", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4-4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:ses:6", "cpe:/o:suse:ses:7", "cpe:/o:suse:ses:7.1", "cpe:/o:suse:sle-module-basesystem:15", "cpe:/o:suse:sle-module-basesystem:15:sp1", "cpe:/o:suse:sle-module-basesystem:15:sp2", "cpe:/o:suse:sle-module-basesystem:15:sp3", "cpe:/o:suse:sle_hpc:15", "cpe:/o:suse:sle_hpc:15:sp1", "cpe:/o:suse:sle_hpc:15:sp2", "cpe:/o:suse:sle_hpc:15:sp3", "cpe:/o:suse:sled:15", "cpe:/o:suse:sled:15:sp1", "cpe:/o:suse:sled:15:sp2", "cpe:/o:suse:sled:15:sp3", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15", "cpe:/o:suse:sles_sap:15:sp1", "cpe:/o:suse:sles_sap:15:sp2", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:suse-manager-proxy:4.0", "cpe:/o:suse:suse-manager-proxy:4.1", "cpe:/o:suse:suse-manager-proxy:4.2", "cpe:/o:suse:suse-manager-retail-branch-server:4.0", "cpe:/o:suse:suse-manager-retail-branch-server:4.1", "cpe:/o:suse:suse-manager-retail-branch-server:4.2"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed4-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4-4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:ses:6", "cpe:/o:suse:ses:7", "cpe:/o:suse:ses:7.1", "cpe:/o:suse:sle-module-basesystem:15:sp1", "cpe:/o:suse:sle-module-basesystem:15:sp2", "cpe:/o:suse:sle-module-basesystem:15:sp3", "cpe:/o:suse:sle-module-desktop-applications:15", "cpe:/o:suse:sle_hpc:15", "cpe:/o:suse:sle_hpc:15:sp1", "cpe:/o:suse:sle_hpc:15:sp2", "cpe:/o:suse:sle_hpc:15:sp3", "cpe:/o:suse:sled:15", "cpe:/o:suse:sled:15:sp1", "cpe:/o:suse:sled:15:sp2", "cpe:/o:suse:sled:15:sp3", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15", "cpe:/o:suse:sles_sap:15:sp1", "cpe:/o:suse:sles_sap:15:sp2", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:suse-manager-proxy:4.0", "cpe:/o:suse:suse-manager-proxy:4.1", "cpe:/o:suse:suse-manager-proxy:4.2", "cpe:/o:suse:suse-manager-retail-branch-server:4.0", "cpe:/o:suse:suse-manager-retail-branch-server:4.1", "cpe:/o:suse:suse-manager-retail-branch-server:4.2"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle6-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4-4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:ses:6", "cpe:/o:suse:ses:7", "cpe:/o:suse:ses:7.1", "cpe:/o:suse:sle-module-basesystem:15:sp1", "cpe:/o:suse:sle-module-basesystem:15:sp2", "cpe:/o:suse:sle-module-basesystem:15:sp3", "cpe:/o:suse:sle-module-desktop-applications:15", "cpe:/o:suse:sle_hpc:15", "cpe:/o:suse:sle_hpc:15:sp1", "cpe:/o:suse:sle_hpc:15:sp2", "cpe:/o:suse:sle_hpc:15:sp3", "cpe:/o:suse:sled:15", "cpe:/o:suse:sled:15:sp1", "cpe:/o:suse:sled:15:sp2", "cpe:/o:suse:sled:15:sp3", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15", "cpe:/o:suse:sles_sap:15:sp1", "cpe:/o:suse:sles_sap:15:sp2", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:suse-manager-proxy:4.0", "cpe:/o:suse:suse-manager-proxy:4.1", "cpe:/o:suse:suse-manager-proxy:4.2", "cpe:/o:suse:suse-manager-retail-branch-server:4.0", "cpe:/o:suse:suse-manager-retail-branch-server:4.1", "cpe:/o:suse:suse-manager-retail-branch-server:4.2"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.8.1-150500.2.25", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp5", "cpe:/o:suse:sle_hpc:15:sp5", "cpe:/o:suse:sled:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles_sap:15:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.8.1-150500.2.25", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp5", "cpe:/o:suse:sle_hpc:15:sp5", "cpe:/o:suse:sled:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles_sap:15:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.8.1-150500.2.25", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp5", "cpe:/o:suse:sle_hpc:15:sp5", "cpe:/o:suse:sled:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles_sap:15:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.8.1-150500.2.25", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp5", "cpe:/o:suse:sle_hpc:15:sp5", "cpe:/o:suse:sled:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles_sap:15:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.8.1-150500.2.25", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp5", "cpe:/o:suse:sle_hpc:15:sp5", "cpe:/o:suse:sled:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles_sap:15:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.9.1-150600.1.46", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.9.1-150600.1.46", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.9.1-150600.1.46", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.9.1-150600.1.46", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.9.1-150600.1.46", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "SUSE bug 1117951"}, {"lang": "en", "value": "SUSE bug 1118086"}, {"lang": "en", "value": "SUSE bug 1118087"}, {"lang": "en", "value": "SUSE bug 1134856"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869", "name": "Mitre CVE-2018-16869"}, {"url": "https://www.suse.com/security/cve/CVE-2018-16869", "name": "SUSE CVE-2018-16869"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html", "name": "SUSE-CU-2019:697-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html", "name": "SUSE-CU-2019:702-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html", "name": "SUSE-CU-2019:735-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html", "name": "SUSE-CU-2019:740-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html", "name": "SUSE-CU-2019:747-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html", "name": "SUSE-CU-2019:760-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html", "name": "SUSE-CU-2020:118-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html", "name": "SUSE-CU-2020:119-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html", "name": "SUSE-CU-2020:120-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html", "name": "SUSE-CU-2020:121-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html", "name": "SUSE-CU-2020:122-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html", "name": "SUSE-CU-2020:196-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html", "name": "SUSE-CU-2020:201-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html", "name": "SUSE-CU-2020:209-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html", "name": "SUSE-CU-2020:212-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html", "name": "SUSE-CU-2020:215-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html", "name": "SUSE-CU-2020:218-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html", "name": "SUSE-CU-2020:221-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html", "name": "SUSE-CU-2020:325-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html", "name": "SUSE-CU-2020:54-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html", "name": "SUSE-CU-2020:91-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html", "name": "SUSE-CU-2020:92-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html", "name": "SUSE-CU-2020:93-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html", "name": "SUSE-IU-2021:605-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-December/004985.html", "name": "SUSE-SU-2018:4193-1"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E4WARDEYGYTIZXYPZANRGPILAZ2K4J5U/#E4WARDEYGYTIZXYPZANRGPILAZ2K4J5U", "name": "openSUSE-SU-2018:4260-1"}], "descriptions": [{"lang": "en", "value": "\n    A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2021-04-30T00:00:00Z", "x_subShortName": "suse_desktop_15"}}, {"metrics": [{"cvssV3_0": {"scope": "CHANGED", "version": "3.0", "baseScore": 5.3, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Moderate\"}"}}}], "affected": [{"vendor": "suse", "product": "libhogweed6", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.7.3-150400.2.21", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sle-module-basesystem:15:sp4", "cpe:/o:suse:sle_hpc:15:sp4", "cpe:/o:suse:sled:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:suse-manager-proxy:4.3", "cpe:/o:suse:suse-manager-retail-branch-server:4.3"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.7.3-150400.2.21", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sle-module-basesystem:15:sp4", "cpe:/o:suse:sle_hpc:15:sp4", "cpe:/o:suse:sled:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:suse-manager-proxy:4.3", "cpe:/o:suse:suse-manager-retail-branch-server:4.3"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.7.3-150400.2.21", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sle-module-basesystem:15:sp4", "cpe:/o:suse:sle_hpc:15:sp4", "cpe:/o:suse:sled:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:suse-manager-proxy:4.3", "cpe:/o:suse:suse-manager-retail-branch-server:4.3"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.7.3-150400.2.21", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sle-module-basesystem:15:sp4", "cpe:/o:suse:sle_hpc:15:sp4", "cpe:/o:suse:sled:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:suse-manager-proxy:4.3", "cpe:/o:suse:suse-manager-retail-branch-server:4.3"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.7.3-150400.2.21", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sle-module-basesystem:15:sp4", "cpe:/o:suse:sle_hpc:15:sp4", "cpe:/o:suse:sled:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:suse-manager-proxy:4.3", "cpe:/o:suse:suse-manager-retail-branch-server:4.3"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-150700.2.16", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-150700.2.16", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-150700.2.16", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-150700.2.16", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-150700.2.16", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed4", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4-4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:ses:6", "cpe:/o:suse:ses:7", "cpe:/o:suse:ses:7.1", "cpe:/o:suse:sle-module-basesystem:15", "cpe:/o:suse:sle-module-basesystem:15:sp1", "cpe:/o:suse:sle-module-basesystem:15:sp2", "cpe:/o:suse:sle-module-basesystem:15:sp3", "cpe:/o:suse:sle_hpc:15", "cpe:/o:suse:sle_hpc:15:sp1", "cpe:/o:suse:sle_hpc:15:sp2", "cpe:/o:suse:sle_hpc:15:sp3", "cpe:/o:suse:sled:15", "cpe:/o:suse:sled:15:sp1", "cpe:/o:suse:sled:15:sp2", "cpe:/o:suse:sled:15:sp3", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15", "cpe:/o:suse:sles_sap:15:sp1", "cpe:/o:suse:sles_sap:15:sp2", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:suse-manager-proxy:4.0", "cpe:/o:suse:suse-manager-proxy:4.1", "cpe:/o:suse:suse-manager-proxy:4.2", "cpe:/o:suse:suse-manager-retail-branch-server:4.0", "cpe:/o:suse:suse-manager-retail-branch-server:4.1", "cpe:/o:suse:suse-manager-retail-branch-server:4.2"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4-4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:ses:6", "cpe:/o:suse:ses:7", "cpe:/o:suse:ses:7.1", "cpe:/o:suse:sle-module-basesystem:15", "cpe:/o:suse:sle-module-basesystem:15:sp1", "cpe:/o:suse:sle-module-basesystem:15:sp2", "cpe:/o:suse:sle-module-basesystem:15:sp3", "cpe:/o:suse:sle_hpc:15", "cpe:/o:suse:sle_hpc:15:sp1", "cpe:/o:suse:sle_hpc:15:sp2", "cpe:/o:suse:sle_hpc:15:sp3", "cpe:/o:suse:sled:15", "cpe:/o:suse:sled:15:sp1", "cpe:/o:suse:sled:15:sp2", "cpe:/o:suse:sled:15:sp3", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15", "cpe:/o:suse:sles_sap:15:sp1", "cpe:/o:suse:sles_sap:15:sp2", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:suse-manager-proxy:4.0", "cpe:/o:suse:suse-manager-proxy:4.1", "cpe:/o:suse:suse-manager-proxy:4.2", "cpe:/o:suse:suse-manager-retail-branch-server:4.0", "cpe:/o:suse:suse-manager-retail-branch-server:4.1", "cpe:/o:suse:suse-manager-retail-branch-server:4.2"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle6", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4-4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:ses:6", "cpe:/o:suse:ses:7", "cpe:/o:suse:ses:7.1", "cpe:/o:suse:sle-module-basesystem:15", "cpe:/o:suse:sle-module-basesystem:15:sp1", "cpe:/o:suse:sle-module-basesystem:15:sp2", "cpe:/o:suse:sle-module-basesystem:15:sp3", "cpe:/o:suse:sle_hpc:15", "cpe:/o:suse:sle_hpc:15:sp1", "cpe:/o:suse:sle_hpc:15:sp2", "cpe:/o:suse:sle_hpc:15:sp3", "cpe:/o:suse:sled:15", "cpe:/o:suse:sled:15:sp1", "cpe:/o:suse:sled:15:sp2", "cpe:/o:suse:sled:15:sp3", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15", "cpe:/o:suse:sles_sap:15:sp1", "cpe:/o:suse:sles_sap:15:sp2", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:suse-manager-proxy:4.0", "cpe:/o:suse:suse-manager-proxy:4.1", "cpe:/o:suse:suse-manager-proxy:4.2", "cpe:/o:suse:suse-manager-retail-branch-server:4.0", "cpe:/o:suse:suse-manager-retail-branch-server:4.1", "cpe:/o:suse:suse-manager-retail-branch-server:4.2"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed4-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4-4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:ses:6", "cpe:/o:suse:ses:7", "cpe:/o:suse:ses:7.1", "cpe:/o:suse:sle-module-basesystem:15:sp1", "cpe:/o:suse:sle-module-basesystem:15:sp2", "cpe:/o:suse:sle-module-basesystem:15:sp3", "cpe:/o:suse:sle-module-desktop-applications:15", "cpe:/o:suse:sle_hpc:15", "cpe:/o:suse:sle_hpc:15:sp1", "cpe:/o:suse:sle_hpc:15:sp2", "cpe:/o:suse:sle_hpc:15:sp3", "cpe:/o:suse:sled:15", "cpe:/o:suse:sled:15:sp1", "cpe:/o:suse:sled:15:sp2", "cpe:/o:suse:sled:15:sp3", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15", "cpe:/o:suse:sles_sap:15:sp1", "cpe:/o:suse:sles_sap:15:sp2", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:suse-manager-proxy:4.0", "cpe:/o:suse:suse-manager-proxy:4.1", "cpe:/o:suse:suse-manager-proxy:4.2", "cpe:/o:suse:suse-manager-retail-branch-server:4.0", "cpe:/o:suse:suse-manager-retail-branch-server:4.1", "cpe:/o:suse:suse-manager-retail-branch-server:4.2"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle6-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.4-4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:ses:6", "cpe:/o:suse:ses:7", "cpe:/o:suse:ses:7.1", "cpe:/o:suse:sle-module-basesystem:15:sp1", "cpe:/o:suse:sle-module-basesystem:15:sp2", "cpe:/o:suse:sle-module-basesystem:15:sp3", "cpe:/o:suse:sle-module-desktop-applications:15", "cpe:/o:suse:sle_hpc:15", "cpe:/o:suse:sle_hpc:15:sp1", "cpe:/o:suse:sle_hpc:15:sp2", "cpe:/o:suse:sle_hpc:15:sp3", "cpe:/o:suse:sled:15", "cpe:/o:suse:sled:15:sp1", "cpe:/o:suse:sled:15:sp2", "cpe:/o:suse:sled:15:sp3", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15", "cpe:/o:suse:sles_sap:15:sp1", "cpe:/o:suse:sles_sap:15:sp2", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:suse-manager-proxy:4.0", "cpe:/o:suse:suse-manager-proxy:4.1", "cpe:/o:suse:suse-manager-proxy:4.2", "cpe:/o:suse:suse-manager-retail-branch-server:4.0", "cpe:/o:suse:suse-manager-retail-branch-server:4.1", "cpe:/o:suse:suse-manager-retail-branch-server:4.2"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.8.1-150500.2.25", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp5", "cpe:/o:suse:sle_hpc:15:sp5", "cpe:/o:suse:sled:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles_sap:15:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.8.1-150500.2.25", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp5", "cpe:/o:suse:sle_hpc:15:sp5", "cpe:/o:suse:sled:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles_sap:15:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.8.1-150500.2.25", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp5", "cpe:/o:suse:sle_hpc:15:sp5", "cpe:/o:suse:sled:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles_sap:15:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.8.1-150500.2.25", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp5", "cpe:/o:suse:sle_hpc:15:sp5", "cpe:/o:suse:sled:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles_sap:15:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.8.1-150500.2.25", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp5", "cpe:/o:suse:sle_hpc:15:sp5", "cpe:/o:suse:sled:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles_sap:15:sp5"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.9.1-150600.1.46", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.9.1-150600.1.46", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.9.1-150600.1.46", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.9.1-150600.1.46", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.9.1-150600.1.46", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "SUSE bug 1117951"}, {"lang": "en", "value": "SUSE bug 1118086"}, {"lang": "en", "value": "SUSE bug 1118087"}, {"lang": "en", "value": "SUSE bug 1134856"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869", "name": "Mitre CVE-2018-16869"}, {"url": "https://www.suse.com/security/cve/CVE-2018-16869", "name": "SUSE CVE-2018-16869"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html", "name": "SUSE-CU-2019:697-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html", "name": "SUSE-CU-2019:702-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html", "name": "SUSE-CU-2019:735-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html", "name": "SUSE-CU-2019:740-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html", "name": "SUSE-CU-2019:747-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html", "name": "SUSE-CU-2019:760-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html", "name": "SUSE-CU-2020:118-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html", "name": "SUSE-CU-2020:119-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html", "name": "SUSE-CU-2020:120-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html", "name": "SUSE-CU-2020:121-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html", "name": "SUSE-CU-2020:122-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html", "name": "SUSE-CU-2020:196-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html", "name": "SUSE-CU-2020:201-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html", "name": "SUSE-CU-2020:209-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html", "name": "SUSE-CU-2020:212-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html", "name": "SUSE-CU-2020:215-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html", "name": "SUSE-CU-2020:218-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html", "name": "SUSE-CU-2020:221-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html", "name": "SUSE-CU-2020:325-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html", "name": "SUSE-CU-2020:54-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html", "name": "SUSE-CU-2020:91-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html", "name": "SUSE-CU-2020:92-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html", "name": "SUSE-CU-2020:93-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html", "name": "SUSE-IU-2021:605-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-December/004985.html", "name": "SUSE-SU-2018:4193-1"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E4WARDEYGYTIZXYPZANRGPILAZ2K4J5U/#E4WARDEYGYTIZXYPZANRGPILAZ2K4J5U", "name": "openSUSE-SU-2018:4260-1"}], "descriptions": [{"lang": "en", "value": "\n    A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2021-04-30T00:00:00Z", "x_subShortName": "suse_server_15"}}, {"metrics": [{"cvssV3_0": {"scope": "CHANGED", "version": "3.0", "baseScore": 5.3, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Moderate\"}"}}}], "affected": [{"vendor": "suse", "product": "libhogweed6", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libhogweed6-x86-64-v3", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libnettle8-x86-64-v3", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "nettle", "versions": [{"status": "affected", "version": "0", "lessThan": "0:3.10.1-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "SUSE bug 1117951"}, {"lang": "en", "value": "SUSE bug 1118086"}, {"lang": "en", "value": "SUSE bug 1118087"}, {"lang": "en", "value": "SUSE bug 1134856"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869", "name": "Mitre CVE-2018-16869"}, {"url": "https://www.suse.com/security/cve/CVE-2018-16869", "name": "SUSE CVE-2018-16869"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006342.html", "name": "SUSE-CU-2019:697-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006352.html", "name": "SUSE-CU-2019:702-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html", "name": "SUSE-CU-2019:735-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html", "name": "SUSE-CU-2019:740-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html", "name": "SUSE-CU-2019:747-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html", "name": "SUSE-CU-2019:760-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html", "name": "SUSE-CU-2020:118-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html", "name": "SUSE-CU-2020:119-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html", "name": "SUSE-CU-2020:120-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html", "name": "SUSE-CU-2020:121-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html", "name": "SUSE-CU-2020:122-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html", "name": "SUSE-CU-2020:196-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html", "name": "SUSE-CU-2020:201-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html", "name": "SUSE-CU-2020:209-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html", "name": "SUSE-CU-2020:212-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html", "name": "SUSE-CU-2020:215-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html", "name": "SUSE-CU-2020:218-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html", "name": "SUSE-CU-2020:221-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html", "name": "SUSE-CU-2020:325-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html", "name": "SUSE-CU-2020:54-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html", "name": "SUSE-CU-2020:91-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html", "name": "SUSE-CU-2020:92-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html", "name": "SUSE-CU-2020:93-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html", "name": "SUSE-IU-2021:605-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-December/004985.html", "name": "SUSE-SU-2018:4193-1"}, {"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E4WARDEYGYTIZXYPZANRGPILAZ2K4J5U/#E4WARDEYGYTIZXYPZANRGPILAZ2K4J5U", "name": "openSUSE-SU-2018:4260-1"}], "descriptions": [{"lang": "en", "value": "\n    A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2025-11-14T00:00:00Z", "x_subShortName": "suse_server_16"}}], "cna": {"metrics": [{"format": "CVSS", "cvssV2_0": {"version": "2.0", "baseScore": 3.3, "accessVector": "LOCAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}}, {"format": "CVSS", "cvssV3_0": {"scope": "CHANGED", "version": "3.0", "baseScore": 4.7, "attackVector": "PHYSICAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}}, {"format": "CVSS", "cvssV3_1": {"scope": "CHANGED", "version": "3.1", "baseScore": 5.7, "attackVector": "PHYSICAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}], "affected": [{"cpes": ["cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*"], "vendor": "nettle_project", "product": "nettle", "versions": [{"status": "affected", "version": "0", "versionType": "custom", "lessThanOrEqual": "3.4"}], "defaultStatus": "unaffected"}], "references": [{"url": "http://www.securityfocus.com/bid/106092", "tags": ["broken-link", "third-party-advisory", "vdb-entry"]}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869", "tags": ["issue-tracking", "third-party-advisory"]}, {"url": "http://cat.eyalro.net/", "tags": ["technical-description", "third-party-advisory"]}], "descriptions": [{"lang": "en", "value": "A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server."}, {"lang": "es", "value": "Se ha detectado un ataque de oráculo de relleno basado en canales laterales de tipo Bleichenbacher en la manera en la que nettle maneja la conversión endian de los datos PKCS#1 v1.5 descifrados de un cifrado RSA. Un atacante que sea capaz de ejecutar un proceso en el mismo núcleo físico que el proceso víctima podría usar este fallo para extraer texto plano o, en algunos casos, desactualizar algunas conexiones TLS a un servidor vulnerable."}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-203", "description": "CWE-203"}]}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000003", "shortName": "nvd", "dateUpdated": "2018-12-03T14:29:00Z", "x_subShortName": "nvd"}}}, "cveMetadata": {"cveId": "CVE-2018-16869", "state": "PUBLISHED", "dateUpdated": "2024-11-21T03:53:29Z", "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "datePublished": "2018-12-03T14:29:00Z", "assignerShortName": "redhat"}, "dataVersion": "5.0"}