CVE-2018-10845

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.
References
Link Resource
http://www.securityfocus.com/bid/105138 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:3050 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3505 Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10845 Issue Tracking Patch Third Party Advisory
https://eprint.iacr.org/2018/747 Third Party Advisory
https://gitlab.com/gnutls/gnutls/merge_requests/657 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
https://usn.ubuntu.com/3999-1/ Third Party Advisory
http://www.securityfocus.com/bid/105138 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:3050 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3505 Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10845 Issue Tracking Patch Third Party Advisory
https://eprint.iacr.org/2018/747 Third Party Advisory
https://gitlab.com/gnutls/gnutls/merge_requests/657 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
https://usn.ubuntu.com/3999-1/ Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/105138 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/105138 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:3050 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:3050 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:3505 - Broken Link () https://access.redhat.com/errata/RHSA-2018:3505 - Broken Link
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10845 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10845 - Issue Tracking, Patch, Third Party Advisory
References () https://eprint.iacr.org/2018/747 - Third Party Advisory () https://eprint.iacr.org/2018/747 - Third Party Advisory
References () https://gitlab.com/gnutls/gnutls/merge_requests/657 - Patch, Third Party Advisory () https://gitlab.com/gnutls/gnutls/merge_requests/657 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/10/msg00022.html - Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/ -
References () https://usn.ubuntu.com/3999-1/ - Third Party Advisory () https://usn.ubuntu.com/3999-1/ - Third Party Advisory

Information

Published : 2018-08-22 13:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-10845

Mitre link : CVE-2018-10845

CVE.ORG link : CVE-2018-10845


JSON object : View

Products Affected

fedoraproject

  • fedora

redhat

  • enterprise_linux_desktop
  • enterprise_linux_server
  • enterprise_linux_workstation

canonical

  • ubuntu_linux

debian

  • debian_linux

gnu

  • gnutls
CWE
CWE-385

Covert Timing Channel

CWE-327

Use of a Broken or Risky Cryptographic Algorithm