A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.CreditsThis issue was discovered by Daiki Ueno (Red Hat).Referenceshttps://access.redhat.com/errata/RHSA-2024:0155https://access.redhat.com/errata/RHSA-2024:0319https://access.redhat.com/errata/RHSA-2024:0399https://access.redhat.com/errata/RHSA-2024:0451https://access.redhat.com/errata/RHSA-2024:0533https://access.redhat.com/errata/RHSA-2024:1383https://access.redhat.com/errata/RHSA-2024:2094https://access.redhat.com/security/cve/CVE-2023-5981https://bugzilla.redhat.com/show_bug.cgi?id=2248445https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23