[Debian] High CVE: CVE-2024-0553/CVE-2024-0567 gnutls28 : multiple CVEs
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
StarlingX |
Fix Released
|
High
|
Peng Zhang |
Bug Description
CVE-2024-0553: https:/
A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.
CVE-2024-0567: https:/
A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-
Base Score: High
Reference:
['libgnutls28-
Changed in starlingx: | |
assignee: | nobody → Peng Zhang (pzhang2) |
Fix proposed to branch: master /review. opendev. org/c/starlingx /tools/ +/924045
Review: https:/