First published: Tue Nov 07 2023(Updated: )
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/GnuTLS | <3.8.2 | 3.8.2 |
ubuntu/gnutls28 | <3.5.18-1ubuntu1.6+ | 3.5.18-1ubuntu1.6+ |
ubuntu/gnutls28 | <3.6.13-2ubuntu1.9 | 3.6.13-2ubuntu1.9 |
ubuntu/gnutls28 | <3.7.3-4ubuntu1.3 | 3.7.3-4ubuntu1.3 |
ubuntu/gnutls28 | <3.7.8-5ubuntu1.1 | 3.7.8-5ubuntu1.1 |
ubuntu/gnutls28 | <3.8.1-4ubuntu1.1 | 3.8.1-4ubuntu1.1 |
ubuntu/gnutls28 | <3.8.2 | 3.8.2 |
debian/gnutls28 | <=3.6.7-4+deb10u8<=3.7.1-5+deb11u3 | 3.6.7-4+deb10u12 3.7.1-5+deb11u4 3.7.9-2+deb12u2 3.8.5-2 |
IBM Security Verify Governance, Identity Manager software component | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager virtual appliance component | <=ISVG 10.0.2 | |
F5 BIG-IP Next (LTM) | >=20.0.1<=20.0.2 | 20.1.0 |
F5 BIG-IP Next Central Manager | >=20.0.1<=20.0.2 | 20.1.0 |
F5 BIG-IP Next | >=1.5.0<=1.9.1 | |
F5 BIG-IP Next | >=1.1.0<=1.3.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.2 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=8.0.0<=8.3.0 | |
F5 F5OS-A | =1.7.0>=1.5.0<=1.5.2=1.4.0>=1.3.0<=1.3.2 | |
F5 F5OS-C | >=1.6.0<=1.6.2>=1.5.0<=1.5.1 | |
F5 Traffix Systems Signaling Delivery Controller | >=5.1.0<=5.2.0 | |
Debian GnuTLS | =1.5.0 | |
Red Hat Linux | =8.0 | |
Red Hat Linux | =9.0 | |
Fedora | =37 | |
Fedora | =38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5981 is a vulnerability found in the RSA-PSK key exchange in GnuTLS, where response times to malformed ciphertexts differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
The severity of CVE-2023-5981 is high with a CVSS severity score of 7.4.
GnuTLS versions up to and excluding 3.8.2, Gnu Gnutls version 1.5.0, Redhat Linux versions 8.0 and 9.0, and Fedora versions 37 and 38 are affected by CVE-2023-5981.
To fix CVE-2023-5981, upgrade GnuTLS to version 3.8.3 or higher.
More information about CVE-2023-5981 can be found on the Red Hat Security Advisory and Bugzilla pages, as well as the GnuTLS GitLab issue.