{"schema_version":"1.7.2","id":"OESA-2023-1867","modified":"2023-12-01T11:06:22Z","published":"2023-12-01T11:06:22Z","upstream":["CVE-2023-5981"],"summary":"gnutls security update","details":"GnuTLS is a secure communications library implementing the SSL, TLS and DTLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols as well as APIs to parse and write X.509, PKCS #12, and other required structures. The project strives to provide a secure communications back-end, simple to use and integrated with the rest of the base Linux libraries. A back-end designed to work and be secure out of the box, keeping the complexity of TLS and PKI out of application code.\r\n\r\nSecurity Fix(es):\r\n\r\nA vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.(CVE-2023-5981)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"gnutls","purl":"pkg:rpm/openEuler/gnutls\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.6.14-13.oe1"}]}],"ecosystem_specific":{"aarch64":["gnutls-debuginfo-3.6.14-13.oe1.aarch64.rpm","gnutls-debugsource-3.6.14-13.oe1.aarch64.rpm","gnutls-3.6.14-13.oe1.aarch64.rpm","gnutls-utils-3.6.14-13.oe1.aarch64.rpm","gnutls-devel-3.6.14-13.oe1.aarch64.rpm"],"noarch":["gnutls-help-3.6.14-13.oe1.noarch.rpm"],"src":["gnutls-3.6.14-13.oe1.src.rpm"],"x86_64":["gnutls-debuginfo-3.6.14-13.oe1.x86_64.rpm","gnutls-3.6.14-13.oe1.x86_64.rpm","gnutls-debugsource-3.6.14-13.oe1.x86_64.rpm","gnutls-utils-3.6.14-13.oe1.x86_64.rpm","gnutls-devel-3.6.14-13.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"gnutls","purl":"pkg:rpm/openEuler/gnutls\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.6.14-13.oe1"}]}],"ecosystem_specific":{"aarch64":["gnutls-debugsource-3.6.14-13.oe1.aarch64.rpm","gnutls-debuginfo-3.6.14-13.oe1.aarch64.rpm","gnutls-3.6.14-13.oe1.aarch64.rpm","gnutls-utils-3.6.14-13.oe1.aarch64.rpm","gnutls-devel-3.6.14-13.oe1.aarch64.rpm"],"noarch":["gnutls-help-3.6.14-13.oe1.noarch.rpm"],"src":["gnutls-3.6.14-13.oe1.src.rpm"],"x86_64":["gnutls-utils-3.6.14-13.oe1.x86_64.rpm","gnutls-debugsource-3.6.14-13.oe1.x86_64.rpm","gnutls-3.6.14-13.oe1.x86_64.rpm","gnutls-debuginfo-3.6.14-13.oe1.x86_64.rpm","gnutls-devel-3.6.14-13.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS","name":"gnutls","purl":"pkg:rpm/openEuler/gnutls\u0026distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.7.2-10.oe2203sp2"}]}],"ecosystem_specific":{"aarch64":["gnutls-devel-3.7.2-9.oe2203.aarch64.rpm","gnutls-debugsource-3.7.2-9.oe2203.aarch64.rpm","gnutls-3.7.2-9.oe2203.aarch64.rpm","gnutls-debuginfo-3.7.2-9.oe2203.aarch64.rpm","gnutls-utils-3.7.2-9.oe2203.aarch64.rpm","gnutls-debugsource-3.7.2-10.oe2203sp1.aarch64.rpm","gnutls-devel-3.7.2-10.oe2203sp1.aarch64.rpm","gnutls-3.7.2-10.oe2203sp1.aarch64.rpm","gnutls-debuginfo-3.7.2-10.oe2203sp1.aarch64.rpm","gnutls-utils-3.7.2-10.oe2203sp1.aarch64.rpm","gnutls-devel-3.7.2-10.oe2203sp2.aarch64.rpm","gnutls-debuginfo-3.7.2-10.oe2203sp2.aarch64.rpm","gnutls-3.7.2-10.oe2203sp2.aarch64.rpm","gnutls-debugsource-3.7.2-10.oe2203sp2.aarch64.rpm","gnutls-utils-3.7.2-10.oe2203sp2.aarch64.rpm"],"noarch":["gnutls-help-3.7.2-9.oe2203.noarch.rpm","gnutls-help-3.7.2-10.oe2203sp1.noarch.rpm","gnutls-help-3.7.2-10.oe2203sp2.noarch.rpm"],"src":["gnutls-3.7.2-9.oe2203.src.rpm","gnutls-3.7.2-10.oe2203sp1.src.rpm","gnutls-3.7.2-10.oe2203sp2.src.rpm"],"x86_64":["gnutls-3.7.2-9.oe2203.x86_64.rpm","gnutls-utils-3.7.2-9.oe2203.x86_64.rpm","gnutls-devel-3.7.2-9.oe2203.x86_64.rpm","gnutls-debuginfo-3.7.2-9.oe2203.x86_64.rpm","gnutls-debugsource-3.7.2-9.oe2203.x86_64.rpm","gnutls-3.7.2-10.oe2203sp1.x86_64.rpm","gnutls-utils-3.7.2-10.oe2203sp1.x86_64.rpm","gnutls-debugsource-3.7.2-10.oe2203sp1.x86_64.rpm","gnutls-devel-3.7.2-10.oe2203sp1.x86_64.rpm","gnutls-debuginfo-3.7.2-10.oe2203sp1.x86_64.rpm","gnutls-debuginfo-3.7.2-10.oe2203sp2.x86_64.rpm","gnutls-debugsource-3.7.2-10.oe2203sp2.x86_64.rpm","gnutls-devel-3.7.2-10.oe2203sp2.x86_64.rpm","gnutls-3.7.2-10.oe2203sp2.x86_64.rpm","gnutls-utils-3.7.2-10.oe2203sp2.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP1","name":"gnutls","purl":"pkg:rpm/openEuler/gnutls\u0026distro=openEuler-22.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.7.2-10.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["gnutls-debugsource-3.7.2-10.oe2203sp1.aarch64.rpm","gnutls-devel-3.7.2-10.oe2203sp1.aarch64.rpm","gnutls-3.7.2-10.oe2203sp1.aarch64.rpm","gnutls-debuginfo-3.7.2-10.oe2203sp1.aarch64.rpm","gnutls-utils-3.7.2-10.oe2203sp1.aarch64.rpm"],"noarch":["gnutls-help-3.7.2-10.oe2203sp1.noarch.rpm"],"src":["gnutls-3.7.2-10.oe2203sp1.src.rpm"],"x86_64":["gnutls-3.7.2-10.oe2203sp1.x86_64.rpm","gnutls-utils-3.7.2-10.oe2203sp1.x86_64.rpm","gnutls-debugsource-3.7.2-10.oe2203sp1.x86_64.rpm","gnutls-devel-3.7.2-10.oe2203sp1.x86_64.rpm","gnutls-debuginfo-3.7.2-10.oe2203sp1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP2","name":"gnutls","purl":"pkg:rpm/openEuler/gnutls\u0026distro=openEuler-22.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.7.2-10.oe2203sp2"}]}],"ecosystem_specific":{"aarch64":["gnutls-devel-3.7.2-10.oe2203sp2.aarch64.rpm","gnutls-debuginfo-3.7.2-10.oe2203sp2.aarch64.rpm","gnutls-3.7.2-10.oe2203sp2.aarch64.rpm","gnutls-debugsource-3.7.2-10.oe2203sp2.aarch64.rpm","gnutls-utils-3.7.2-10.oe2203sp2.aarch64.rpm"],"noarch":["gnutls-help-3.7.2-10.oe2203sp2.noarch.rpm"],"src":["gnutls-3.7.2-10.oe2203sp2.src.rpm"],"x86_64":["gnutls-debuginfo-3.7.2-10.oe2203sp2.x86_64.rpm","gnutls-debugsource-3.7.2-10.oe2203sp2.x86_64.rpm","gnutls-devel-3.7.2-10.oe2203sp2.x86_64.rpm","gnutls-3.7.2-10.oe2203sp2.x86_64.rpm","gnutls-utils-3.7.2-10.oe2203sp2.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2023-1867"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5981"}],"database_specific":{"severity":"Medium"}}