A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "gnutls-bin-dbgsym": "3.4.10-4ubuntu1.5", "libgnutls-openssl27-dbgsym": "3.4.10-4ubuntu1.5", "gnutls-doc": "3.4.10-4ubuntu1.5", "libgnutls28-dev": "3.4.10-4ubuntu1.5", "libgnutls-openssl27": "3.4.10-4ubuntu1.5", "guile-gnutls-dbgsym": "3.4.10-4ubuntu1.5", "libgnutlsxx28-dbgsym": "3.4.10-4ubuntu1.5", "libgnutls30": "3.4.10-4ubuntu1.5", "gnutls-bin": "3.4.10-4ubuntu1.5", "guile-gnutls": "3.4.10-4ubuntu1.5", "libgnutls30-dbgsym": "3.4.10-4ubuntu1.5", "libgnutls-dev": "3.4.10-4ubuntu1.5", "libgnutlsxx28": "3.4.10-4ubuntu1.5" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "gnutls-bin-dbgsym": "3.5.18-1ubuntu1.1", "libgnutls-openssl27-dbgsym": "3.5.18-1ubuntu1.1", "gnutls-doc": "3.5.18-1ubuntu1.1", "libgnutls28-dev": "3.5.18-1ubuntu1.1", "libgnutls-dane0-dbgsym": "3.5.18-1ubuntu1.1", "libgnutlsxx28-dbgsym": "3.5.18-1ubuntu1.1", "libgnutls-dane0": "3.5.18-1ubuntu1.1", "gnutls-bin": "3.5.18-1ubuntu1.1", "libgnutls30": "3.5.18-1ubuntu1.1", "libgnutls-openssl27": "3.5.18-1ubuntu1.1", "libgnutls30-dbgsym": "3.5.18-1ubuntu1.1", "libgnutlsxx28": "3.5.18-1ubuntu1.1" } ] }