-----BEGIN PGP SIGNATURE-----
wsB5BAABCAAjFiEEGq96SdAIJY1vInRLbzAtCH6LqTYFAmWb4wYFAwAAAAAACgkQbzAtCH6LqTbu
QQf+NYlg2hsCjSEr2lH3IX1p6J2ixiNL4/KOwJIFnplk3Hf1/8Fx560htV0Gxe9+avILP8gYQila
4ejJuZnMIpov2ybD1icNyMrSM2S5dwb8bIiVYqZgrTqaE2Nqd6QXctvJCNUqTq5NGUtLlCmenN++
T3WlXlICwi4O9slFQr8XvMwoquCvYNdxU1SeoC0bmEj+hMspaS458auSh8KCzJytWQsE0tOg5hM1
mjctMcdfyYzSoH9aggB04TKifDdYwkT9s99cRCkeuRMRxhMbW5WOzdHbk5jANhjgZgTbuUnHeebx
nn1+ruom7MHPrQqpctmXeJSeWoazR2j7ABhHOZ+LjQ==
=+BJw
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6499-2
January 08, 2024
gnutls28 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
Summary:
GnuTLS could be made to expose sensitive information over the network.
Software Description:
- gnutls28: GNU TLS library
Details:
USN-6499-1 fixed vulnerabilities in GnuTLS. This update provides the
corresponding update for Ubuntu 18.04 LTS.
Original advisory details:
It was discovered that GnuTLS had a timing side-channel when handling
certain RSA-PSK key exchanges. A remote attacker could possibly use this
issue to recover sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
libgnutls30 3.5.18-1ubuntu1.6+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6499-2
https://ubuntu.com/security/notices/USN-6499-1
CVE-2023-5981
No comments:
Post a Comment