CVE-2018-10846
Published: 22 August 2018
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
Priority
CVSS 3 base score: 5.6
Status
Package | Release | Status |
---|---|---|
gnutls26 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Does not exist
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Does not exist
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Needs triage
|
|
gnutls28 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.5.19,3.6.3)
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(3.6.5-2ubuntu1)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(3.6.5-2ubuntu1)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(3.5.18-1ubuntu1.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(3.4.10-4ubuntu1.5)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was needed)
|
|
Patches: Upstream: https://gitlab.com/gnutls/gnutls/merge_requests/657 Upstream: https://gitlab.com/gnutls/gnutls/commit/ce671a6db9e47006cff152d485091141b1569f39 (3.6) |
Notes
Author | Note |
---|---|
mdeslaur | same commits as listed in CVE-2018-10844 |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846
- https://eprint.iacr.org/2018/747
- https://usn.ubuntu.com/usn/usn-3999-1
- NVD
- Launchpad
- Debian