Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-12336

Опубликовано: 19 апр. 2024
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2024-12336: gnutls security update (MODERATE)

[3.7.6-23.4_fips]

  • Add FIPS package change: add fips suffix to Release and set Epoch to 10 [Orabug: 35925409]
  • Update FIPS module name for Oracle Linux [Orabug: 35925409]
  • Verify salt length and iteration count for PBKDF [Orabug: 35925409]

[3.7.6-23.4]

  • Fix timing side-channel in deterministic ECDSA (RHEL-28958)
  • Fix potential crash during chain building/verification (RHEL-28953)

[3.7.6-23.3]

  • x509: detect loop in certificate chain (RHEL-21759)
  • fips: Zeroize temporary values in integrity check (RHEL-21870)

[3.7.6-23.2]

  • auth/rsa_psk: minimize branching after decryption

[3.7.6-23.1]

  • auth/rsa_psk: side-step potential side-channel (RHEL-16755)

[3.7.6-23]

  • Mark SHA-1 signature verification non-approved in FIPS (#2102751)

[3.7.6-22]

  • Skip KTLS test on old kernel if host and target arches are different

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

gnutls

3.7.6-23.el9_3.4_fips

gnutls-c++

3.7.6-23.el9_3.4_fips

gnutls-dane

3.7.6-23.el9_3.4_fips

gnutls-devel

3.7.6-23.el9_3.4_fips

gnutls-utils

3.7.6-23.el9_3.4_fips

Oracle Linux x86_64

gnutls

3.7.6-23.el9_3.4_fips

gnutls-c++

3.7.6-23.el9_3.4_fips

gnutls-dane

3.7.6-23.el9_3.4_fips

gnutls-devel

3.7.6-23.el9_3.4_fips

gnutls-utils

3.7.6-23.el9_3.4_fips

Связанные уязвимости

oracle-oval
больше 1 года назад

ELSA-2024-0533: gnutls security update (MODERATE)

suse-cvrf
около 1 года назад

Security update for gnutls

suse-cvrf
больше 1 года назад

Security update for gnutls

suse-cvrf
больше 1 года назад

Security update for gnutls

CVSS3: 7.5
ubuntu
больше 1 года назад

A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.