Description
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1560-1 | gnutls28 security update |
EUVD |
EUVD-2018-2915 | A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets. |
Ubuntu USN |
USN-3999-1 | GnuTLS vulnerabilities |
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Gnu
Subscribe
Gnutls
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Workstation
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T07:46:47.512Z
Reserved: 2018-05-09T00:00:00.000Z
Link: CVE-2018-10846
No data.
Status : Modified
Published: 2018-08-22T13:29:00.627
Modified: 2024-11-21T03:42:07.920
Link: CVE-2018-10846
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN