The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.2.11-2ubuntu1", "binary_name": "guile-gnutls" }, { "binary_version": "3.2.11-2ubuntu1", "binary_name": "libgnutls-xssl0" }, { "binary_version": "3.2.11-2ubuntu1", "binary_name": "libgnutls28" }, { "binary_version": "3.2.11-2ubuntu1", "binary_name": "libgnutls28-dbg" }, { "binary_version": "3.2.11-2ubuntu1", "binary_name": "libgnutls28-dev" }, { "binary_version": "3.2.11-2ubuntu1", "binary_name": "libgnutlsxx28" } ] }