rpm package
suse/libnettle&distro=SUSE Linux Enterprise Module for Desktop Applications 15
pkg:rpm/suse/libnettle&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015
Vulnerabilities (2)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2019-3880 | — | < 3.4.1-4.9.1 | 3.4.1-4.9.1 | Apr 9, 2019 | A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba sh | ||
| CVE-2018-16869 | — | < 3.4-4.3.1 | 3.4-4.3.1 | Dec 3, 2018 | A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext |
- CVE-2019-3880Apr 9, 2019affected < 3.4.1-4.9.1fixed 3.4.1-4.9.1
A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba sh
- CVE-2018-16869Dec 3, 2018affected < 3.4-4.3.1fixed 3.4-4.3.1
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext