Описание
ELSA-2024-12336: gnutls security update (MODERATE)
[3.7.6-23.4_fips]
- Add FIPS package change: add fips suffix to Release and set Epoch to 10 [Orabug: 35925409]
- Update FIPS module name for Oracle Linux [Orabug: 35925409]
- Verify salt length and iteration count for PBKDF [Orabug: 35925409]
[3.7.6-23.4]
- Fix timing side-channel in deterministic ECDSA (RHEL-28958)
- Fix potential crash during chain building/verification (RHEL-28953)
[3.7.6-23.3]
- x509: detect loop in certificate chain (RHEL-21759)
- fips: Zeroize temporary values in integrity check (RHEL-21870)
[3.7.6-23.2]
- auth/rsa_psk: minimize branching after decryption
[3.7.6-23.1]
- auth/rsa_psk: side-step potential side-channel (RHEL-16755)
[3.7.6-23]
- Mark SHA-1 signature verification non-approved in FIPS (#2102751)
[3.7.6-22]
- Skip KTLS test on old kernel if host and target arches are different
Обновленные пакеты
Oracle Linux 9
Oracle Linux aarch64
gnutls
3.7.6-23.el9_3.4_fips
gnutls-c++
3.7.6-23.el9_3.4_fips
gnutls-dane
3.7.6-23.el9_3.4_fips
gnutls-devel
3.7.6-23.el9_3.4_fips
gnutls-utils
3.7.6-23.el9_3.4_fips
Oracle Linux x86_64
gnutls
3.7.6-23.el9_3.4_fips
gnutls-c++
3.7.6-23.el9_3.4_fips
gnutls-dane
3.7.6-23.el9_3.4_fips
gnutls-devel
3.7.6-23.el9_3.4_fips
gnutls-utils
3.7.6-23.el9_3.4_fips
Ссылки на источники
Связанные уязвимости
A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.