CVE-2013-1619
Publication date 8 February 2013
Last updated 24 July 2024
Ubuntu priority
The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
Status
Package | Ubuntu Release | Status |
---|---|---|
gnutls13 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty | Not in release | |
gnutls26 | ||
16.04 LTS xenial | Not in release | |
14.04 LTS trusty |
Not affected
|
|
gnutls28 | ||
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release | |
Notes
References
Related Ubuntu Security Notices (USN)
- USN-1752-1
- GnuTLS vulnerability
- 27 February 2013