ALT-PU-2024-6994-1
Closed vulnerabilities
BDU:2023-07001
Уязвимость криптографической библиотеки транспортного уровня GnuTLS, связанная с различием времени ответа при обработке шифротекста RSA в сообщении ClientKeyExchange с корректным и некорректным добавочным заполнением PKCS#1, позволяющая нарушителю восстановить ключ для расшифровки сообщений
BDU:2024-00705
Уязвимость криптографической библиотеки GnuTLS, связанная с ошибками проверки криптографической подписи, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-00707
Уязвимость криптографической библиотеки транспортного уровня GnuTLS, связанная с различием времени ответа при обработке шифротекста RSA в сообщении ClientKeyExchange с корректным и некорректным добавочным заполнением PKCS#1, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2024-01500
Уязвимость библиотеки безопасности транспортного уровня GnuTLS, связанная с раскрытием информации через несоответствие, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2024-02399
Уязвимость функции gnutls_x509_trust_list_verify_crt2() библиотеки безопасности транспортного уровня GnuTLS, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-03-19
CVE-2023-0361
A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.
- https://access.redhat.com/security/cve/CVE-2023-0361
- https://access.redhat.com/security/cve/CVE-2023-0361
- https://github.com/tlsfuzzer/tlsfuzzer/pull/679
- https://github.com/tlsfuzzer/tlsfuzzer/pull/679
- https://gitlab.com/gnutls/gnutls/-/issues/1050
- https://gitlab.com/gnutls/gnutls/-/issues/1050
- [debian-lts-announce] 20230218 [SECURITY] [DLA 3321-1] gnutls28 security update
- [debian-lts-announce] 20230218 [SECURITY] [DLA 3321-1] gnutls28 security update
- FEDORA-2023-1c4a6a47ae
- FEDORA-2023-1c4a6a47ae
- FEDORA-2023-4fc4c33f2b
- FEDORA-2023-4fc4c33f2b
- FEDORA-2023-5b378b82b3
- FEDORA-2023-5b378b82b3
- https://security.netapp.com/advisory/ntap-20230324-0005/
- https://security.netapp.com/advisory/ntap-20230324-0005/
- https://security.netapp.com/advisory/ntap-20230725-0005/
- https://security.netapp.com/advisory/ntap-20230725-0005/
Modified: 2024-11-21
CVE-2023-5981
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
- http://www.openwall.com/lists/oss-security/2024/01/19/3
- RHSA-2024:0155
- RHSA-2024:0155
- RHSA-2024:0319
- RHSA-2024:0319
- RHSA-2024:0399
- RHSA-2024:0399
- RHSA-2024:0451
- RHSA-2024:0451
- RHSA-2024:0533
- RHSA-2024:0533
- RHSA-2024:1383
- RHSA-2024:1383
- RHSA-2024:2094
- RHSA-2024:2094
- https://access.redhat.com/security/cve/CVE-2023-5981
- https://access.redhat.com/security/cve/CVE-2023-5981
- RHBZ#2248445
- RHBZ#2248445
- https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
- https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
Modified: 2024-11-21
CVE-2024-0553
A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.
- http://www.openwall.com/lists/oss-security/2024/01/19/3
- RHSA-2024:0533
- RHSA-2024:0533
- RHSA-2024:0627
- RHSA-2024:0627
- RHSA-2024:0796
- RHSA-2024:0796
- RHSA-2024:1082
- RHSA-2024:1082
- RHSA-2024:1108
- RHSA-2024:1108
- RHSA-2024:1383
- RHSA-2024:1383
- RHSA-2024:2094
- RHSA-2024:2094
- https://access.redhat.com/security/cve/CVE-2024-0553
- https://access.redhat.com/security/cve/CVE-2024-0553
- RHBZ#2258412
- RHBZ#2258412
- https://gitlab.com/gnutls/gnutls/-/issues/1522
- https://gitlab.com/gnutls/gnutls/-/issues/1522
- https://lists.debian.org/debian-lts-announce/2024/02/msg00010.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
- https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
- https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
- https://security.netapp.com/advisory/ntap-20240202-0011/
Modified: 2024-11-21
CVE-2024-0567
A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.
- http://www.openwall.com/lists/oss-security/2024/01/19/3
- RHSA-2024:0533
- RHSA-2024:0533
- RHSA-2024:1082
- RHSA-2024:1082
- RHSA-2024:1383
- RHSA-2024:1383
- RHSA-2024:2094
- RHSA-2024:2094
- https://access.redhat.com/security/cve/CVE-2024-0567
- https://access.redhat.com/security/cve/CVE-2024-0567
- RHBZ#2258544
- RHBZ#2258544
- https://gitlab.com/gnutls/gnutls/-/issues/1521
- https://gitlab.com/gnutls/gnutls/-/issues/1521
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
- https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
- https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
- https://security.netapp.com/advisory/ntap-20240202-0011/
Modified: 2024-11-22
CVE-2024-28834
A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.
- http://www.openwall.com/lists/oss-security/2024/03/22/1
- http://www.openwall.com/lists/oss-security/2024/03/22/2
- RHSA-2024:1784
- RHSA-2024:1784
- RHSA-2024:1879
- RHSA-2024:1879
- RHSA-2024:1997
- RHSA-2024:1997
- RHSA-2024:2044
- RHSA-2024:2044
- RHSA-2024:2570
- RHSA-2024:2570
- RHSA-2024:2889
- RHSA-2024:2889
- https://access.redhat.com/security/cve/CVE-2024-28834
- https://access.redhat.com/security/cve/CVE-2024-28834
- RHBZ#2269228
- RHBZ#2269228
- https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
- https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
- https://minerva.crocs.fi.muni.cz/
- https://minerva.crocs.fi.muni.cz/
- https://people.redhat.com/~hkario/marvin/
- https://security.netapp.com/advisory/ntap-20240524-0004/
Modified: 2024-11-22
CVE-2024-28835
A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command.
- http://www.openwall.com/lists/oss-security/2024/03/22/1
- http://www.openwall.com/lists/oss-security/2024/03/22/2
- RHSA-2024:1879
- RHSA-2024:1879
- RHSA-2024:2570
- RHSA-2024:2570
- RHSA-2024:2889
- RHSA-2024:2889
- https://access.redhat.com/security/cve/CVE-2024-28835
- https://access.redhat.com/security/cve/CVE-2024-28835
- RHBZ#2269084
- RHBZ#2269084
- https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
- https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
- https://security.netapp.com/advisory/ntap-20241122-0009/