A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
Covert timing channels convey information by modulating some aspect of system behavior over time, so that the program receiving the information can observe system behavior and infer protected information.
The product uses a broken or risky cryptographic algorithm or protocol.
Link | Tags |
---|---|
https://eprint.iacr.org/2018/747 | third party advisory |
https://gitlab.com/gnutls/gnutls/merge_requests/657 | patch third party advisory issue tracking |
https://access.redhat.com/errata/RHSA-2018:3505 | vendor advisory broken link |
http://www.securityfocus.com/bid/105138 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10846 | patch third party advisory issue tracking |
https://access.redhat.com/errata/RHSA-2018:3050 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html | third party advisory mailing list |
https://usn.ubuntu.com/3999-1/ | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/ | vendor advisory |