Bug 23682 - gnutls new security issues CVE-2018-1084[4-6]
Summary: gnutls new security issues CVE-2018-1084[4-6]
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 6
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA6-64-OK MGA6-32-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2018-10-13 00:45 CEST by David Walser
Modified: 2018-11-03 12:56 CET (History)
9 users (show)

See Also:
Source RPM: gnutls-3.5.13-1.mga6.src.rpm
CVE: CVE-2018-10844, CVE-2018-10845, CVE-2018-10846
Status comment:


Attachments

Description David Walser 2018-10-13 00:45:28 CEST
openSUSE has issued advisories on September 25 and October 1:
https://lists.opensuse.org/opensuse-updates/2018-09/msg00147.html
https://lists.opensuse.org/opensuse-updates/2018-10/msg00000.html

It looks like all are fixed with a merge request upstream:
https://gitlab.com/gnutls/gnutls/merge_requests/657

Mageia 6 is also affected.
David Walser 2018-10-13 00:45:35 CEST

Whiteboard: (none) => MGA6TOO

Comment 1 Marja Van Waes 2018-10-13 08:41:18 CEST
Assigning to all packagers collectively, since there is no registered maintainer for this package.

Also CC'ing some committers.

Assignee: bugsquad => pkg-bugs
CC: (none) => guillomovitch, marja11, pterjan, smelror, tmb

Comment 2 Nicolas Salguero 2018-10-15 10:46:49 CEST
Hi,

Version 3.6.3 (Cauldron) already contains the fixes for those issues.

Best regards,

Nico.

CC: (none) => nicolas.salguero

Comment 3 Nicolas Salguero 2018-10-15 10:58:03 CEST
Suggested advisory:
========================

The updated packages fix security vulnerabilities:

It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets. (CVE-2018-10844)

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets. (CVE-2018-10845)

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets. (CVE-2018-10846)

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846
https://lists.opensuse.org/opensuse-updates/2018-09/msg00147.html
https://lists.opensuse.org/opensuse-updates/2018-10/msg00000.html
========================

Updated packages in core/updates_testing:
========================
gnutls-3.5.13-1.1.mga6
lib(64)gnutls30-3.5.13-1.1.mga6
lib(64)gnutlsxx28-3.5.13-1.1.mga6
lib(64)gnutls-devel-3.5.13-1.1.mga6

from SRPMS:
gnutls-3.5.13-1.1.mga6.src.rpm

Whiteboard: MGA6TOO => (none)
Version: Cauldron => 6
Assignee: pkg-bugs => qa-bugs
Status: NEW => ASSIGNED
CVE: (none) => CVE-2018-10844, CVE-2018-10845, CVE-2018-10846

Comment 4 Herman Viaene 2018-10-30 10:04:24 CET
MGA6-32 MATE on IBM Thinkpad R50e
No installation issues
Ref to bug 20417 Comment 11: I installed xombrero, point it to google, enter "apod" in the search field and select the astronomical picture of the day. Very nice.

Whiteboard: (none) => MGA6-32-OK
CC: (none) => herman.viaene

Comment 5 Thomas Andrews 2018-11-02 15:02:34 CET
Performed the same test with 64-bit, because it sounded really easy, and indeed it looks very nice.

OK for 64-bit. Validating. Advisory in Comment 3.

Whiteboard: MGA6-32-OK => MGA6-64-OK MGA6-32-OK
Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Thomas Backlund 2018-11-03 11:57:04 CET

Keywords: (none) => advisory

Comment 6 Mageia Robot 2018-11-03 12:56:38 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2018-0435.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.