Mageia 2018-0435: gnutls security update
Summary
The updated packages fix security vulnerabilities:
It was found that the GnuTLS implementation of HMAC-SHA-256 and
HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote
attackers could use this flaw to conduct distinguishing attacks and
plaintext-recovery attacks via statistical analysis of timing data
using crafted packets (CVE-2018-10844, CVE-2018-10845).
A cache-based side channel in GnuTLS implementation that leads to plain
text recovery in cross-VM attack setting was found. An attacker could
use a combination of "Just in Time" Prime+probe attack in combination
with Lucky-13 attack to recover plain text using crafted packets
(CVE-2018-10846).
References
- https://bugs.mageia.org/show_bug.cgi?id=23682
- - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846
Resolution
MGASA-2018-0435 - Updated gnutls packages fix security vulnerabilities
SRPMS
- 6/core/gnutls-3.5.13-1.1.mga6