CVE-2018-16868

NameCVE-2018-16868
DescriptionA Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow (attack range: local)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gnutls28 (PTS)jessie3.3.8-6+deb8u7vulnerable
jessie (security)3.3.30-0+deb8u1vulnerable
stretch3.5.8-5+deb9u4vulnerable
stretch (security)3.5.8-5+deb9u1vulnerable
buster, sid3.6.7-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gnutls26source(unstable)(unfixed)low
gnutls28source(unstable)3.6.5-2low
gnutls28sourceexperimental3.6.5-1low

Notes

[jessie] - gnutls28 <no-dsa> (Minor issue - https://lists.debian.org/debian-lts/2019/03/msg00021.html)
http://cat.eyalro.net/
https://gitlab.com/gnutls/gnutls/issues/630
https://gitlab.com/gnutls/gnutls/merge_requests/832
CVE-2018-16869 must be fixed first and a new build dependency on this new
nettle version.

Search for package or bug name: Reporting problems