CVE-2018-16868

Priority
Description
A Bleichenbacher type side-channel based padding oracle attack was found in
the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An
attacker who is able to run process on the same physical core as the victim
process, could use this to extract plaintext or in some cases downgrade any
TLS connections to a vulnerable server.
Assigned-to
mdeslaur
Notes
mdeslaurFixing this requires fixing CVE-2018-16869 in nettle first, but
nettle changes are too intrusive to backport to stable releases.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):needs-triage
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan):DNE
Package
Upstream:released (3.6.5-2)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.04 (Disco Dingo):released (3.6.5-2ubuntu1)
Ubuntu 19.10 (Eoan):released (3.6.5-2ubuntu1)
Patches:
Upstream:https://gitlab.com/gnutls/gnutls/commit/ed3bdddab73c792364deec423b2c2c498a939a64 (3.6)
Upstream:https://gitlab.com/gnutls/gnutls/commit/4804febddc2ed958e5ae774de2a8f85edeeff538 (3.6)
More Information

Updated: 2019-10-18 02:38:00 UTC (commit cccfc4426d8c1fbf582a89d981fe7fc812124543)