First published: Mon Jan 22 2024(Updated: )
It was discovered that GnuTLS had a timing side-channel when processing malformed ciphertexts in RSA-PSK ClientKeyExchange. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2024-0553) It was discovered that GnuTLS incorrectly handled certain certificate chains with a cross-signing loop. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10. (CVE-2024-0567)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libgnutls30 | <3.8.1-4ubuntu1.2 | 3.8.1-4ubuntu1.2 |
Ubuntu Ubuntu | =23.10 | |
All of | ||
ubuntu/libgnutls30 | <3.7.8-5ubuntu1.2 | 3.7.8-5ubuntu1.2 |
Ubuntu Ubuntu | =23.04 | |
All of | ||
ubuntu/libgnutls30 | <3.7.3-4ubuntu1.4 | 3.7.3-4ubuntu1.4 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/libgnutls30 | <3.6.13-2ubuntu1.10 | 3.6.13-2ubuntu1.10 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.