The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "guile-gnutls",
"binary_version": "3.2.11-2ubuntu1"
},
{
"binary_name": "libgnutls-xssl0",
"binary_version": "3.2.11-2ubuntu1"
},
{
"binary_name": "libgnutls28",
"binary_version": "3.2.11-2ubuntu1"
},
{
"binary_name": "libgnutls28-dbg",
"binary_version": "3.2.11-2ubuntu1"
},
{
"binary_name": "libgnutls28-dev",
"binary_version": "3.2.11-2ubuntu1"
},
{
"binary_name": "libgnutlsxx28",
"binary_version": "3.2.11-2ubuntu1"
}
]
}