A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105138 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2018:3050 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:3505 | Broken Link |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10846 | Issue Tracking Patch Third Party Advisory |
https://eprint.iacr.org/2018/747 | Third Party Advisory |
https://gitlab.com/gnutls/gnutls/merge_requests/657 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/ | |
https://usn.ubuntu.com/3999-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2018-08-22 13:29
Updated : 2024-02-28 16:48
NVD link : CVE-2018-10846
Mitre link : CVE-2018-10846
CVE.ORG link : CVE-2018-10846
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_workstation
canonical
- ubuntu_linux
debian
- debian_linux
gnu
- gnutls
fedoraproject
- fedora