First published: Mon Apr 15 2024(Updated: )
It was discovered that GnuTLS had a timing side-channel when performing certain ECDSA operations. A remote attacker could possibly use this issue to recover sensitive information. (CVE-2024-28834) It was discovered that GnuTLS incorrectly handled verifying certain PEM bundles. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS and Ubuntu 23.10. (CVE-2024-28835)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libgnutls30 | <3.8.1-4ubuntu1.3 | 3.8.1-4ubuntu1.3 |
Ubuntu Linux | =23.10 | |
All of | ||
ubuntu/libgnutls30 | <3.7.3-4ubuntu1.5 | 3.7.3-4ubuntu1.5 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/libgnutls30 | <3.6.13-2ubuntu1.11 | 3.6.13-2ubuntu1.11 |
Ubuntu Linux | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6733-1 is considered high due to the potential for remote attackers to recover sensitive information.
To fix USN-6733-1, update the libgnutls30 package to the appropriate version for your Ubuntu release.
USN-6733-1 affects libgnutls30 versions prior to 3.8.1-4ubuntu1.3 for 23.10, 3.7.3-4ubuntu1.5 for 22.04, and 3.6.13-2ubuntu1.11 for 20.04.
USN-6733-1 addresses a timing side-channel vulnerability and incorrect handling of verifying certain PEM bundles in GnuTLS.
Not resolving USN-6733-1 could allow remote attackers to exploit the vulnerabilities and potentially access sensitive information.