ARM mbed TLS before 2.12.0, before 2.7.5, and before 2.1.14 allows remote attackers to achieve partial plaintext recovery (for a CBC based ciphersuite) via a timing-based side-channel attack. This vulnerability exists because of an incorrect fix (with a wrong SHA-384 calculation) for CVE-2013-0169.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2.2.1-2ubuntu0.3", "binary_name": "libmbedcrypto0" }, { "binary_version": "2.2.1-2ubuntu0.3", "binary_name": "libmbedcrypto0-dbgsym" }, { "binary_version": "2.2.1-2ubuntu0.3", "binary_name": "libmbedtls-dev" }, { "binary_version": "2.2.1-2ubuntu0.3", "binary_name": "libmbedtls-doc" }, { "binary_version": "2.2.1-2ubuntu0.3", "binary_name": "libmbedtls10" }, { "binary_version": "2.2.1-2ubuntu0.3", "binary_name": "libmbedtls10-dbgsym" }, { "binary_version": "2.2.1-2ubuntu0.3", "binary_name": "libmbedx509-0" }, { "binary_version": "2.2.1-2ubuntu0.3", "binary_name": "libmbedx509-0-dbgsym" } ] }