A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
{
"binaries": [
{
"binary_version": "3.0.11+really2.12.23-12ubuntu2.8",
"binary_name": "gnutls-bin"
},
{
"binary_version": "2.12.23-12ubuntu2.8",
"binary_name": "libgnutls-dev"
},
{
"binary_version": "2.12.23-12ubuntu2.8",
"binary_name": "libgnutls-openssl27"
},
{
"binary_version": "2.12.23-12ubuntu2.8",
"binary_name": "libgnutls26"
},
{
"binary_version": "2.12.23-12ubuntu2.8",
"binary_name": "libgnutlsxx27"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "3.4.10-4ubuntu1.5",
"binary_name": "gnutls-bin"
},
{
"binary_version": "3.4.10-4ubuntu1.5",
"binary_name": "guile-gnutls"
},
{
"binary_version": "3.4.10-4ubuntu1.5",
"binary_name": "libgnutls-dev"
},
{
"binary_version": "3.4.10-4ubuntu1.5",
"binary_name": "libgnutls-openssl27"
},
{
"binary_version": "3.4.10-4ubuntu1.5",
"binary_name": "libgnutls28-dev"
},
{
"binary_version": "3.4.10-4ubuntu1.5",
"binary_name": "libgnutls30"
},
{
"binary_version": "3.4.10-4ubuntu1.5",
"binary_name": "libgnutlsxx28"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "3.5.18-1ubuntu1.1",
"binary_name": "gnutls-bin"
},
{
"binary_version": "3.5.18-1ubuntu1.1",
"binary_name": "libgnutls-dane0"
},
{
"binary_version": "3.5.18-1ubuntu1.1",
"binary_name": "libgnutls-openssl27"
},
{
"binary_version": "3.5.18-1ubuntu1.1",
"binary_name": "libgnutls28-dev"
},
{
"binary_version": "3.5.18-1ubuntu1.1",
"binary_name": "libgnutls30"
},
{
"binary_version": "3.5.18-1ubuntu1.1",
"binary_name": "libgnutlsxx28"
}
]
}