[USN-6593-1] GnuTLS vulnerabilities

Marc Deslauriers marc.deslauriers at canonical.com
Mon Jan 22 15:06:30 UTC 2024

Ubuntu Security Notice USN-6593-1
January 22, 2024

gnutls28 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 23.10
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS


Several security issues were fixed in GnuTLS.

Software Description:
- gnutls28: GNU TLS library


It was discovered that GnuTLS had a timing side-channel when processing
malformed ciphertexts in RSA-PSK ClientKeyExchange. A remote attacker could
possibly use this issue to recover sensitive information. (CVE-2024-0553)

It was discovered that GnuTLS incorrectly handled certain certificate
chains with a cross-signing loop. A remote attacker could possibly use this
issue to cause GnuTLS to crash, resulting in a denial of service. This
issue only affected Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
   libgnutls30                     3.8.1-4ubuntu1.2

Ubuntu 23.04:
   libgnutls30                     3.7.8-5ubuntu1.2

Ubuntu 22.04 LTS:
   libgnutls30                     3.7.3-4ubuntu1.4

Ubuntu 20.04 LTS:
   libgnutls30                     3.6.13-2ubuntu1.10

In general, a standard system update will make all the necessary changes.

   CVE-2024-0553, CVE-2024-0567

Package Information:

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20240122/7e649fb8/attachment-0001.sig>

More information about the ubuntu-security-announce mailing list