First published: Fri May 25 2018(Updated: )
A cache-based side channel in GnuTLS implementation that leads to plaintext recovery in cross-VM attack setting was found. The attack exploits a novel "Just in Time" PRIME + PROBE attack in combination with a new variant of the original Lucky 13 attack.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 Traffix Systems Signaling Delivery Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1582574 is high due to its potential for plaintext recovery in cross-VM attack scenarios.
To fix REDHAT-BUG-1582574, upgrade your GnuTLS implementation to the latest version that addresses this vulnerability.
REDHAT-BUG-1582574 affects systems using vulnerable versions of GnuTLS.
REDHAT-BUG-1582574 involves a cache-based side channel attack combining the Just in Time PRIME + PROBE technique with a variant of the Lucky 13 attack.
A reliable workaround for REDHAT-BUG-1582574 is not recommended; upgrading to a patched software version is advised.