First published: Tue Nov 07 2023(Updated: )
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/GnuTLS | <3.8.2 | 3.8.2 |
ubuntu/gnutls28 | <3.5.18-1ubuntu1.6+ | 3.5.18-1ubuntu1.6+ |
ubuntu/gnutls28 | <3.6.13-2ubuntu1.9 | 3.6.13-2ubuntu1.9 |
ubuntu/gnutls28 | <3.7.3-4ubuntu1.3 | 3.7.3-4ubuntu1.3 |
ubuntu/gnutls28 | <3.7.8-5ubuntu1.1 | 3.7.8-5ubuntu1.1 |
ubuntu/gnutls28 | <3.8.1-4ubuntu1.1 | 3.8.1-4ubuntu1.1 |
ubuntu/gnutls28 | <3.8.2 | 3.8.2 |
debian/gnutls28 | <=3.6.7-4+deb10u8<=3.7.1-5+deb11u3 | 3.6.7-4+deb10u12 3.7.1-5+deb11u4 3.7.9-2+deb12u2 3.8.5-2 |
F5 BIG-IP Next | >=20.0.1<=20.0.2 | 20.1.0 |
F5 BIG-IP Next Central Manager | >=20.0.1<=20.0.2 | 20.1.0 |
F5 BIG-IP Next SPK | >=1.5.0<=1.9.1 | |
F5 BIG-IP Next CNF | >=1.1.0<=1.3.0 | |
F5 BIG-IP | >=17.1.0<=17.1.1 | |
F5 BIG-IP | >=16.1.0<=16.1.4 | |
F5 BIG-IP | >=15.1.0<=15.1.10 | |
F5 BIG-IQ Centralized Management | >=8.0.0<=8.3.0 | |
F5 F5OS-A | =1.7.0>=1.5.0<=1.5.2=1.4.0>=1.3.0<=1.3.2 | |
F5 F5OS-C | >=1.6.0<=1.6.2>=1.5.0<=1.5.1 | |
F5 Traffix SDC | >=5.1.0<=5.2.0 | |
GNU GnuTLS | =1.5.0 | |
Redhat Linux | =8.0 | |
Redhat Linux | =9.0 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
IBM QRadar Network Packet Capture | <=7.5.0 - 7.5.0 Update Package 7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5981 is a vulnerability found in the RSA-PSK key exchange in GnuTLS, where response times to malformed ciphertexts differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
The severity of CVE-2023-5981 is high with a CVSS severity score of 7.4.
GnuTLS versions up to and excluding 3.8.2, Gnu Gnutls version 1.5.0, Redhat Linux versions 8.0 and 9.0, and Fedora versions 37 and 38 are affected by CVE-2023-5981.
To fix CVE-2023-5981, upgrade GnuTLS to version 3.8.3 or higher.
More information about CVE-2023-5981 can be found on the Red Hat Security Advisory and Bugzilla pages, as well as the GnuTLS GitLab issue.