Количество 25
Количество 25
ELSA-2018-3050
ELSA-2018-3050: gnutls security, bug fix, and enhancement update (MODERATE)
openSUSE-SU-2018:2958-1
Security update for gnutls
openSUSE-SU-2018:2854-1
Security update for gnutls
SUSE-SU-2018:2930-1
Security update for gnutls
SUSE-SU-2018:2842-1
Security update for gnutls
SUSE-SU-2018:2825-2
Security update for gnutls
SUSE-SU-2018:2825-1
Security update for gnutls
CVE-2018-10846
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
CVE-2018-10846
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
CVE-2018-10846
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
CVE-2018-10846
A cache-based side channel in GnuTLS implementation that leads to plai ...
GHSA-qgw6-cgvx-vw2g
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
SUSE-SU-2019:14058-1
Security update for gnutls
CVE-2018-10845
It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.
CVE-2018-10845
It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.
CVE-2018-10845
It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.
CVE-2018-10845
It was found that the GnuTLS implementation of HMAC-SHA-384 was vulner ...
CVE-2018-10844
It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.
CVE-2018-10844
It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.
CVE-2018-10844
It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2018-3050 ELSA-2018-3050: gnutls security, bug fix, and enhancement update (MODERATE) | около 7 лет назад | |||
openSUSE-SU-2018:2958-1 Security update for gnutls | около 7 лет назад | |||
openSUSE-SU-2018:2854-1 Security update for gnutls | около 7 лет назад | |||
SUSE-SU-2018:2930-1 Security update for gnutls | около 7 лет назад | |||
SUSE-SU-2018:2842-1 Security update for gnutls | около 7 лет назад | |||
SUSE-SU-2018:2825-2 Security update for gnutls | около 7 лет назад | |||
SUSE-SU-2018:2825-1 Security update for gnutls | около 7 лет назад | |||
CVE-2018-10846 A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets. | CVSS3: 5.6 | 0% Низкий | около 7 лет назад | |
CVE-2018-10846 A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets. | CVSS3: 5.3 | 0% Низкий | около 7 лет назад | |
CVE-2018-10846 A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets. | CVSS3: 5.6 | 0% Низкий | около 7 лет назад | |
CVE-2018-10846 A cache-based side channel in GnuTLS implementation that leads to plai ... | CVSS3: 5.6 | 0% Низкий | около 7 лет назад | |
GHSA-qgw6-cgvx-vw2g A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets. | CVSS3: 5.6 | 0% Низкий | больше 3 лет назад | |
SUSE-SU-2019:14058-1 Security update for gnutls | больше 6 лет назад | |||
CVE-2018-10845 It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets. | CVSS3: 5.9 | 1% Низкий | около 7 лет назад | |
CVE-2018-10845 It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets. | CVSS3: 5.9 | 1% Низкий | около 7 лет назад | |
CVE-2018-10845 It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets. | CVSS3: 5.9 | 1% Низкий | около 7 лет назад | |
CVE-2018-10845 It was found that the GnuTLS implementation of HMAC-SHA-384 was vulner ... | CVSS3: 5.9 | 1% Низкий | около 7 лет назад | |
CVE-2018-10844 It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets. | CVSS3: 5.9 | 0% Низкий | около 7 лет назад | |
CVE-2018-10844 It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets. | CVSS3: 5.9 | 0% Низкий | около 7 лет назад | |
CVE-2018-10844 It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets. | CVSS3: 5.9 | 0% Низкий | около 7 лет назад |
Уязвимостей на страницу