CVE-2018-10846

Published: 22 August 2018

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.

Priority

Medium

CVSS 3 base score: 5.6

Status

Package Release Status
gnutls26
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 20.10 (Groovy Gorilla) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Needs triage

gnutls28
Launchpad, Ubuntu, Debian
Upstream
Released (3.5.19,3.6.3)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(3.6.5-2ubuntu1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(3.6.5-2ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (3.5.18-1ubuntu1.1)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (3.4.10-4ubuntu1.5)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)
Patches:
Upstream: https://gitlab.com/gnutls/gnutls/merge_requests/657
Upstream: https://gitlab.com/gnutls/gnutls/commit/ce671a6db9e47006cff152d485091141b1569f39 (3.6)