diff options
author | Vijay Anusuri <vanusuri@mvista.com> | 2024-01-23 11:10:38 +0530 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2024-01-31 03:51:10 -1000 |
commit | 574b30350364287ca9c29f44174d8448f140b278 (patch) | |
tree | d29cb555751f1a315cadbcf69c08ed78552e1e96 /meta/recipes-extended/pam | |
parent | bffa4f3051a7cae61ccb63b6d711e94f633ae32f (diff) | |
download | poky-574b30350364287ca9c29f44174d8448f140b278.tar.gz |
gnutls: Backport fix for CVE-2024-0553
CVE-2024-0553
A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.
Upstream-Status: Backport [https://gitlab.com/gnutls/gnutls/-/commit/40dbbd8de499668590e8af51a15799fbc430595e]
(From OE-Core rev: a07cc0b6fa4a485f318fd2957e434b63f5907d7e)
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/recipes-extended/pam')
0 files changed, 0 insertions, 0 deletions