Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2018:2842-1

Опубликовано: 24 сент. 2018
Источник: suse-cvrf

Описание

Security update for gnutls

This update for gnutls fixes the following issues:

Security issues fixed:

  • Improved mitigations against Lucky 13 class of attacks
    • 'Just in Time' PRIME + PROBE cache-based side channel attack can lead to plaintext recovery (CVE-2018-10846, bsc#1105460)
    • HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant (CVE-2018-10845, bsc#1105459)
    • HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls (CVE-2018-10844, bsc#1105437)
  • The _asn1_check_identifier function in Libtasn1 caused a NULL pointer dereference and crash (CVE-2017-10790, bsc#1047002)

Список пакетов

SUSE Linux Enterprise Desktop 12 SP3
gnutls-3.3.27-3.3.1
libgnutls28-3.3.27-3.3.1
libgnutls28-32bit-3.3.27-3.3.1
SUSE Linux Enterprise Server 12 SP3
gnutls-3.3.27-3.3.1
libgnutls-openssl27-3.3.27-3.3.1
libgnutls28-3.3.27-3.3.1
libgnutls28-32bit-3.3.27-3.3.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
gnutls-3.3.27-3.3.1
libgnutls-openssl27-3.3.27-3.3.1
libgnutls28-3.3.27-3.3.1
libgnutls28-32bit-3.3.27-3.3.1
SUSE Linux Enterprise Software Development Kit 12 SP3
libgnutls-devel-3.3.27-3.3.1
libgnutls-openssl-devel-3.3.27-3.3.1
libgnutlsxx-devel-3.3.27-3.3.1
libgnutlsxx28-3.3.27-3.3.1

Описание

The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP3:gnutls-3.3.27-3.3.1
SUSE Linux Enterprise Desktop 12 SP3:libgnutls28-3.3.27-3.3.1
SUSE Linux Enterprise Desktop 12 SP3:libgnutls28-32bit-3.3.27-3.3.1
SUSE Linux Enterprise Server 12 SP3:gnutls-3.3.27-3.3.1

Ссылки

Описание

It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP3:gnutls-3.3.27-3.3.1
SUSE Linux Enterprise Desktop 12 SP3:libgnutls28-3.3.27-3.3.1
SUSE Linux Enterprise Desktop 12 SP3:libgnutls28-32bit-3.3.27-3.3.1
SUSE Linux Enterprise Server 12 SP3:gnutls-3.3.27-3.3.1

Ссылки

Описание

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP3:gnutls-3.3.27-3.3.1
SUSE Linux Enterprise Desktop 12 SP3:libgnutls28-3.3.27-3.3.1
SUSE Linux Enterprise Desktop 12 SP3:libgnutls28-32bit-3.3.27-3.3.1
SUSE Linux Enterprise Server 12 SP3:gnutls-3.3.27-3.3.1

Ссылки

Описание

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP3:gnutls-3.3.27-3.3.1
SUSE Linux Enterprise Desktop 12 SP3:libgnutls28-3.3.27-3.3.1
SUSE Linux Enterprise Desktop 12 SP3:libgnutls28-32bit-3.3.27-3.3.1
SUSE Linux Enterprise Server 12 SP3:gnutls-3.3.27-3.3.1

Ссылки