Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2024.0008
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2024-0008)
Zusammenfassung:The remote host is missing an update for the 'gnutls' package(s) announced via the MGASA-2024-0008 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'gnutls' package(s) announced via the MGASA-2024-0008 advisory.

Vulnerability Insight:
The updated packages fix a security vulnerability:
A vulnerability was found that the response times to malformed
ciphertexts in RSA-PSK ClientKeyExchange differ from response times of
ciphertexts with correct PKCS#1 v1.5 padding. (CVE-2023-5981)

Affected Software/OS:
'gnutls' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
5.4

CVSS Vector:
AV:N/AC:H/Au:N/C:C/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2023-5981
RHBZ#2248445
https://bugzilla.redhat.com/show_bug.cgi?id=2248445
RHSA-2024:0155
https://access.redhat.com/errata/RHSA-2024:0155
RHSA-2024:0319
https://access.redhat.com/errata/RHSA-2024:0319
RHSA-2024:0399
https://access.redhat.com/errata/RHSA-2024:0399
RHSA-2024:0451
https://access.redhat.com/errata/RHSA-2024:0451
RHSA-2024:0533
https://access.redhat.com/errata/RHSA-2024:0533
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/security/cve/CVE-2023-5981
https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
CopyrightCopyright (C) 2024 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.