VYPR

rpm package

suse/gnutls&distro=SUSE Linux Enterprise Server 12-LTSS

pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS

Vulnerabilities (4)

  • CVE-2018-10846Aug 22, 2018
    affected < 3.2.15-18.6.1fixed 3.2.15-18.6.1

    A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.

  • CVE-2018-10845Aug 22, 2018
    affected < 3.2.15-18.6.1fixed 3.2.15-18.6.1

    It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.

  • CVE-2018-10844Aug 22, 2018
    affected < 3.2.15-18.6.1fixed 3.2.15-18.6.1

    It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.

  • CVE-2017-10790HigJul 2, 2017
    affected < 3.2.15-18.6.1fixed 3.2.15-18.6.1

    The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.