CVE-2018-10846

Priority
Description
A cache-based side channel in GnuTLS implementation that leads to plain
text recovery in cross-VM attack setting was found. An attacker could use a
combination of "Just in Time" Prime+probe attack in combination with
Lucky-13 attack to recover plain text using crafted packets.
Notes
 mdeslaur> same commits as listed in CVE-2018-10844
Assigned-to
mdeslaur
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):needs-triage
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan):DNE
Package
Upstream:released (3.5.19,3.6.3)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):released (3.4.10-4ubuntu1.5)
Ubuntu 18.04 LTS (Bionic Beaver):released (3.5.18-1ubuntu1.1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (3.6.4-2ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (3.6.5-2ubuntu1)
Ubuntu 19.10 (Eoan):not-affected (3.6.5-2ubuntu1)
Patches:
Upstream:https://gitlab.com/gnutls/gnutls/merge_requests/657
Upstream:https://gitlab.com/gnutls/gnutls/commit/ce671a6db9e47006cff152d485091141b1569f39 (3.6)
More Information

Updated: 2019-05-30 14:14:20 UTC (commit 2492ca94c8fbbb725eafe4918306eefa2ecce77a)