First published: Tue Nov 21 2023(Updated: )
It was discovered that GnuTLS had a timing side-channel when handling certain RSA-PSK key exchanges. A remote attacker could possibly use this issue to recover sensitive information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libgnutls30 | <3.8.1-4ubuntu1.1 | 3.8.1-4ubuntu1.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/libgnutls30 | <3.7.8-5ubuntu1.1 | 3.7.8-5ubuntu1.1 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/libgnutls30 | <3.7.3-4ubuntu1.3 | 3.7.3-4ubuntu1.3 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libgnutls30 | <3.6.13-2ubuntu1.9 | 3.6.13-2ubuntu1.9 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6499-1 is classified as a medium risk due to the potential for a remote attacker to recover sensitive information through a timing side-channel.
To fix USN-6499-1, you should upgrade the affected libgnutls30 package to the recommended version according to your Ubuntu release.
USN-6499-1 affects Ubuntu versions 23.10, 23.04, 22.04, and 20.04 using vulnerable versions of libgnutls30.
USN-6499-1 is a timing side-channel vulnerability related to RSA-PSK key exchanges in GnuTLS.
There is currently no known public exploit for USN-6499-1, but the vulnerability could be theoretically exploited by a remote attacker.