A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
CPE | Name | Operator | Version |
---|---|---|---|
gnutls | eq | 3.4.10-r0 | |
gnutls | eq | 3.4.7-r0 | |
gnutls | eq | 3.6.5-r0 | |
gnutls | eq | gnutls_1_1_13 | |
gnutls | eq | 3.6.8-r0 | |
gnutls | eq | gnutls_1_3_1 | |
gnutls | eq | gnutls_0_9_91 | |
gnutls | eq | gnutls_0_2_11 | |
gnutls | eq | gnutls_1_1_16 | |
gnutls | eq | 3.5.12-r0 |
www.openwall.com/lists/oss-security/2024/01/19/3
access.redhat.com/errata/RHSA-2024:0155
access.redhat.com/errata/RHSA-2024:0319
access.redhat.com/errata/RHSA-2024:0399
access.redhat.com/errata/RHSA-2024:0451
access.redhat.com/errata/RHSA-2024:0533
access.redhat.com/security/cve/CVE-2023-5981
bugzilla.redhat.com/show_bug.cgi?id=2248445
gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
lists.fedoraproject.org/archives/list/[email protected]/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
lists.fedoraproject.org/archives/list/[email protected]/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/