{"id":"CVE-2015-8803","details":"The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805.","modified":"2026-04-16T01:43:21.071169192Z","published":"2016-02-23T19:59:01Z","withdrawn":"2026-01-27T04:15:18.107742Z","related":["SUSE-SU-2016:0455-1","openSUSE-SU-2024:10339-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2582.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2897-1"},{"type":"ADVISORY","url":"https://lists.lysator.liu.se/pipermail/nettle-bugs/2015/003028.html"},{"type":"ARTICLE","url":"https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html"},{"type":"FIX","url":"https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176807.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177229.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177473.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/02/02/2"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/02/03/1"},{"type":"WEB","url":"https://lists.gnu.org/archive/html/info-gnu/2016-01/msg00006.html"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}