Name | CVE-2018-16868 |
Description | A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
gnutls28 (PTS) | jessie, jessie (lts) | 3.3.30-0+deb8u2 | vulnerable |
| stretch (security) | 3.5.8-5+deb9u6 | vulnerable |
| stretch (lts), stretch | 3.5.8-5+deb9u7 | vulnerable |
| buster (security), buster, buster (lts) | 3.6.7-4+deb10u12 | fixed |
| bullseye | 3.7.1-5+deb11u5 | fixed |
| bullseye (security) | 3.7.1-5+deb11u6 | fixed |
| bookworm | 3.7.9-2+deb12u3 | fixed |
| sid, trixie | 3.8.8-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
gnutls26 | source | (unstable) | (unfixed) | | | |
gnutls28 | source | experimental | 3.6.5-1 | | | |
gnutls28 | source | (unstable) | 3.6.5-2 | | | |
Notes
[stretch] - gnutls28 <no-dsa> (Minor issue)
[jessie] - gnutls28 <ignored> (Too invasive to fix, requires newer nettle shared lib - https://lists.debian.org/debian-lts/2019/03/msg00021.html)
http://cat.eyalro.net/
https://gitlab.com/gnutls/gnutls/issues/630
https://gitlab.com/gnutls/gnutls/merge_requests/832
CVE-2018-16869 must be fixed first and a new build dependency on this new
nettle version.
[wheezy] - gnutls26 <ignored> (Required changes are too intrusive at this point in time and the benefits do not outweigh them.)