First published: Tue Apr 04 2023(Updated: )
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.<br>Security Fix(es):<br><li> gnutls: timing side-channel in the TLS RSA key exchange code (CVE-2023-0361)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br><li> trap invalid opcode ip:7feef81809fe sp:7fee997419c0 error:0 in libgnutls.so.30.28.2[7feef8040000+1dd000] (BZ#2131152)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gnutls | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-dane | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-dane | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-dane-debuginfo | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-dane-debuginfo | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-debuginfo | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-debuginfo | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-debugsource | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-debugsource | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-devel | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-devel | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-utils | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-utils-debuginfo | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-utils-debuginfo | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-utils | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-dane | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-dane-debuginfo | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-debuginfo | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-debugsource | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-devel | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-utils | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls-utils-debuginfo | <3.6.16-6.el8_7 | 3.6.16-6.el8_7 |
redhat/gnutls | <3.6.16-6.el8_7.aa | 3.6.16-6.el8_7.aa |
redhat/gnutls-dane | <3.6.16-6.el8_7.aa | 3.6.16-6.el8_7.aa |
redhat/gnutls-dane-debuginfo | <3.6.16-6.el8_7.aa | 3.6.16-6.el8_7.aa |
redhat/gnutls-debuginfo | <3.6.16-6.el8_7.aa | 3.6.16-6.el8_7.aa |
redhat/gnutls-debugsource | <3.6.16-6.el8_7.aa | 3.6.16-6.el8_7.aa |
redhat/gnutls-devel | <3.6.16-6.el8_7.aa | 3.6.16-6.el8_7.aa |
redhat/gnutls-utils | <3.6.16-6.el8_7.aa | 3.6.16-6.el8_7.aa |
redhat/gnutls-utils-debuginfo | <3.6.16-6.el8_7.aa | 3.6.16-6.el8_7.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability RHSA-2023:1569 is of high severity due to the timing side-channel in the TLS RSA key exchange code.
To fix RHSA-2023:1569, update the gnutls package to version 3.6.16-6.el8_7 or later.
Packages affected by RHSA-2023:1569 include gnutls, gnutls-dane, and their corresponding debuginfo packages.
CVE-2023-0361 is the specific identifier for the timing side-channel vulnerability addressed in RHSA-2023:1569.
There is no recommended workaround for RHSA-2023:1569; the best action is to apply the security update.