CVE-2018-16868

Priority
Description
A Bleichenbacher type side-channel based padding oracle attack was found in
the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An
attacker who is able to run process on the same physical core as the victim
process, could use this to extract plaintext or in some cases downgrade any
TLS connections to a vulnerable server.
Notes
 mdeslaur> Fixing this requires fixing CVE-2018-16869 in nettle first, but
 mdeslaur> nettle changes are too intrusive to backport to stable releases.
Assigned-to
mdeslaur
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):needs-triage
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan):DNE
Package
Upstream:released (3.6.5-2)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 18.10 (Cosmic Cuttlefish):needed
Ubuntu 19.04 (Disco Dingo):released (3.6.5-2ubuntu1)
Ubuntu 19.10 (Eoan):released (3.6.5-2ubuntu1)
Patches:
Upstream:https://gitlab.com/gnutls/gnutls/commit/ed3bdddab73c792364deec423b2c2c498a939a64 (3.6)
Upstream:https://gitlab.com/gnutls/gnutls/commit/4804febddc2ed958e5ae774de2a8f85edeeff538 (3.6)
More Information

Updated: 2019-05-28 18:14:19 UTC (commit c276d3199bb8ad9c28f3b64764fe71c0ce7465dc)