The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
{
"binaries": [
{
"binary_version": "3.2.11-2ubuntu1",
"binary_name": "guile-gnutls"
},
{
"binary_version": "3.2.11-2ubuntu1",
"binary_name": "libgnutls-xssl0"
},
{
"binary_version": "3.2.11-2ubuntu1",
"binary_name": "libgnutls28"
},
{
"binary_version": "3.2.11-2ubuntu1",
"binary_name": "libgnutls28-dbg"
},
{
"binary_version": "3.2.11-2ubuntu1",
"binary_name": "libgnutls28-dev"
},
{
"binary_version": "3.2.11-2ubuntu1",
"binary_name": "libgnutlsxx28"
}
],
"availability": "No subscription required"
}