ALT-PU-2020-1224-1
Closed vulnerabilities
BDU:2020-01598
Уязвимость реализации механизма HMAC-SHA-256 криптографической библиотеки GnuTLS, позволяющая нарушителю осуществить атаку типа «Lucky 13» и атаку с восстановлением открытого текста
BDU:2020-01599
Уязвимость реализации механизма HMAC-SHA-384 криптографической библиотеки GnuTLS, позволяющая нарушителю осуществить атаку типа «Lucky 13» и атаку с восстановлением открытого текста
Modified: 2024-11-21
CVE-2018-10844
It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.
- 105138
- 105138
- RHSA-2018:3050
- RHSA-2018:3050
- RHSA-2018:3505
- RHSA-2018:3505
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10844
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10844
- https://eprint.iacr.org/2018/747
- https://eprint.iacr.org/2018/747
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- [debian-lts-announce] 20181030 [SECURITY] [DLA 1560-1] gnutls28 security update
- [debian-lts-announce] 20181030 [SECURITY] [DLA 1560-1] gnutls28 security update
- FEDORA-2020-d14280a6e8
- FEDORA-2020-d14280a6e8
- FEDORA-2020-f90fb78f70
- FEDORA-2020-f90fb78f70
- USN-3999-1
- USN-3999-1
Modified: 2024-11-21
CVE-2018-10845
It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.
- 105138
- 105138
- RHSA-2018:3050
- RHSA-2018:3050
- RHSA-2018:3505
- RHSA-2018:3505
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10845
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10845
- https://eprint.iacr.org/2018/747
- https://eprint.iacr.org/2018/747
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- [debian-lts-announce] 20181030 [SECURITY] [DLA 1560-1] gnutls28 security update
- [debian-lts-announce] 20181030 [SECURITY] [DLA 1560-1] gnutls28 security update
- FEDORA-2020-d14280a6e8
- FEDORA-2020-d14280a6e8
- FEDORA-2020-f90fb78f70
- FEDORA-2020-f90fb78f70
- USN-3999-1
- USN-3999-1
Modified: 2024-11-21
CVE-2018-10846
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
- 105138
- 105138
- RHSA-2018:3050
- RHSA-2018:3050
- RHSA-2018:3505
- RHSA-2018:3505
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10846
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10846
- https://eprint.iacr.org/2018/747
- https://eprint.iacr.org/2018/747
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- [debian-lts-announce] 20181030 [SECURITY] [DLA 1560-1] gnutls28 security update
- [debian-lts-announce] 20181030 [SECURITY] [DLA 1560-1] gnutls28 security update
- FEDORA-2020-d14280a6e8
- FEDORA-2020-d14280a6e8
- FEDORA-2020-f90fb78f70
- FEDORA-2020-f90fb78f70
- USN-3999-1
- USN-3999-1