File _patchinfo of Package patchinfo.8596
<patchinfo incident="8596"> <issue tracker="bnc" id="1105437">VUL-0: CVE-2018-10844: gnutls: HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls</issue> <issue tracker="bnc" id="1105460">VUL-0: CVE-2018-10846: gnutls: "Just in Time" PRIME + PROBE cache-based side channel attack can lead to plaintext recovery</issue> <issue tracker="bnc" id="1105459">VUL-0: CVE-2018-10845: gnutls: HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant</issue> <issue tracker="bnc" id="1047002">VUL-1: CVE-2017-10790: gnutls: The _asn1_check_identifier function in GNU Libtasn1 before 4.12(including 4.12) causes a NULL pointer dereference and crash</issue> <issue tracker="cve" id="2018-10845"/> <issue tracker="cve" id="2018-10844"/> <issue tracker="cve" id="2017-10790"/> <issue tracker="cve" id="2018-10846"/> <category>security</category> <rating>moderate</rating> <packager>vitezslav_cizek</packager> <description>This update for gnutls fixes the following issues: This update for gnutls fixes the following issues: Security issues fixed: - Improved mitigations against Lucky 13 class of attacks - "Just in Time" PRIME + PROBE cache-based side channel attack can lead to plaintext recovery (CVE-2018-10846, bsc#1105460) - HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant (CVE-2018-10845, bsc#1105459) - HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls (CVE-2018-10844, bsc#1105437) - The _asn1_check_identifier function in Libtasn1 caused a NULL pointer dereference and crash (CVE-2017-10790, bsc#1047002) </description> <summary>Security update for gnutls</summary> </patchinfo>