CVE-2018-16868

Priority
Description
A Bleichenbacher type side-channel based padding oracle attack was found in
the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An
attacker who is able to run process on the same physical core as the victim
process, could use this to extract plaintext or in some cases downgrade any
TLS connections to a vulnerable server.
Notes
 mdeslaur> Fixing this requires fixing CVE-2018-16869 in nettle first.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):needs-triage
Trusty/esm:needs-triage
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan):DNE
Package
Upstream:released (3.6.5-2)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Trusty/esm:DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 18.10 (Cosmic Cuttlefish):needed
Ubuntu 19.04 (Disco Dingo):released (3.6.5-2ubuntu1)
Ubuntu 19.10 (Eoan):released (3.6.5-2ubuntu1)
More Information

Updated: 2019-04-26 14:27:18 UTC (commit 30899e40836d26e1bb5f0b072d31fd87b6cf3bd4)