A cache-based side channel attack was found in the way GnuTLS implements CBC-mode cipher suites. An attacker could use a combination of "Just in Time" Prime+probe and Lucky-13 attacks to recover plain text in a cross-VM attack scenario.
A cache-based side channel in GnuTLS implementation that leads to plaintext recovery in cross-VM attack setting was found. The attack exploits a novel "Just in Time" PRIME + PROBE attack in combination with a new variant of the original Lucky 13 attack.
Created gnutls tracking bugs for this issue:
Affects: fedora-all [bug 1619522]
Created gnutls30 tracking bugs for this issue:
Affects: epel-all [bug 1619524]
Created mingw-gnutls tracking bugs for this issue:
Affects: epel-all [bug 1619525]
Affects: fedora-all [bug 1619523]
This issue has been addressed in the following products:
Red Hat Enterprise Linux 7
Via RHSA-2018:3050 https://access.redhat.com/errata/RHSA-2018:3050