Описание
Security update for gnutls
This update for gnutls fixes the following issues:
Security issues fixed:
- Improved mitigations against Lucky 13 class of attacks
- 'Just in Time' PRIME + PROBE cache-based side channel attack can lead to plaintext recovery (CVE-2018-10846, bsc#1105460)
- HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant (CVE-2018-10845, bsc#1105459)
- HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls (CVE-2018-10844, bsc#1105437)
- The _asn1_check_identifier function in Libtasn1 caused a NULL pointer dereference and crash (CVE-2017-10790, bsc#1047002)
Список пакетов
SUSE Linux Enterprise Desktop 12 SP3
SUSE Linux Enterprise Server 12 SP3
SUSE Linux Enterprise Server for SAP Applications 12 SP3
SUSE Linux Enterprise Software Development Kit 12 SP3
Ссылки
- Link for SUSE-SU-2018:2842-1
- E-Mail link for SUSE-SU-2018:2842-1
- SUSE Security Ratings
- SUSE Bug 1047002
- SUSE Bug 1105437
- SUSE Bug 1105459
- SUSE Bug 1105460
- SUSE CVE CVE-2017-10790 page
- SUSE CVE CVE-2018-10844 page
- SUSE CVE CVE-2018-10845 page
- SUSE CVE CVE-2018-10846 page
Описание
The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.
Затронутые продукты
Ссылки
- CVE-2017-10790
- SUSE Bug 1047002
- SUSE Bug 1047453
Описание
It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.
Затронутые продукты
Ссылки
- CVE-2018-10844
- SUSE Bug 1105437
- SUSE Bug 1105459
Описание
It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.
Затронутые продукты
Ссылки
- CVE-2018-10845
- SUSE Bug 1105437
- SUSE Bug 1105459
Описание
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
Затронутые продукты
Ссылки
- CVE-2018-10846
- SUSE Bug 1105460