It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.
Covert timing channels convey information by modulating some aspect of system behavior over time, so that the program receiving the information can observe system behavior and infer protected information.
The product uses a broken or risky cryptographic algorithm or protocol.
Link | Tags |
---|---|
https://eprint.iacr.org/2018/747 | third party advisory |
https://gitlab.com/gnutls/gnutls/merge_requests/657 | issue tracking third party advisory patch |
https://access.redhat.com/errata/RHSA-2018:3505 | vendor advisory broken link |
http://www.securityfocus.com/bid/105138 | vdb entry third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10844 | issue tracking third party advisory patch |
https://access.redhat.com/errata/RHSA-2018:3050 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html | third party advisory mailing list |
https://usn.ubuntu.com/3999-1/ | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/ | vendor advisory |