A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
{ "binaries": [ { "binary_version": "3.0.11+really2.12.23-12ubuntu2.8", "binary_name": "gnutls-bin" }, { "binary_version": "2.12.23-12ubuntu2.8", "binary_name": "libgnutls-dev" }, { "binary_version": "2.12.23-12ubuntu2.8", "binary_name": "libgnutls-openssl27" }, { "binary_version": "2.12.23-12ubuntu2.8", "binary_name": "libgnutls26" }, { "binary_version": "2.12.23-12ubuntu2.8", "binary_name": "libgnutlsxx27" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "3.4.10-4ubuntu1.5", "binary_name": "gnutls-bin" }, { "binary_version": "3.4.10-4ubuntu1.5", "binary_name": "guile-gnutls" }, { "binary_version": "3.4.10-4ubuntu1.5", "binary_name": "libgnutls-dev" }, { "binary_version": "3.4.10-4ubuntu1.5", "binary_name": "libgnutls-openssl27" }, { "binary_version": "3.4.10-4ubuntu1.5", "binary_name": "libgnutls28-dev" }, { "binary_version": "3.4.10-4ubuntu1.5", "binary_name": "libgnutls30" }, { "binary_version": "3.4.10-4ubuntu1.5", "binary_name": "libgnutlsxx28" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "3.5.18-1ubuntu1.1", "binary_name": "gnutls-bin" }, { "binary_version": "3.5.18-1ubuntu1.1", "binary_name": "libgnutls-dane0" }, { "binary_version": "3.5.18-1ubuntu1.1", "binary_name": "libgnutls-openssl27" }, { "binary_version": "3.5.18-1ubuntu1.1", "binary_name": "libgnutls28-dev" }, { "binary_version": "3.5.18-1ubuntu1.1", "binary_name": "libgnutls30" }, { "binary_version": "3.5.18-1ubuntu1.1", "binary_name": "libgnutlsxx28" } ] }