UbuntuUpdates.org

Package "gnutls28"

Name: gnutls28

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • GNU TLS library - commandline utilities
  • GNU TLS library - GNU Guile bindings

Latest version: 3.7.3-4ubuntu1.5
Release: jammy (22.04)
Level: security
Repository: universe

Links



Other versions of "gnutls28" in Jammy

Repository Area Version
base main 3.7.3-4ubuntu1
base universe 3.7.3-4ubuntu1
security main 3.7.3-4ubuntu1.5
updates main 3.7.3-4ubuntu1.5
updates universe 3.7.3-4ubuntu1.5

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.7.3-4ubuntu1.5 2024-04-15 18:07:06 UTC

  gnutls28 (3.7.3-4ubuntu1.5) jammy-security; urgency=medium

  * SECURITY UPDATE: side-channel leak via Minerva attack
    - debian/patches/CVE-2024-28834.patch: avoid normalization of mpz_t in
      deterministic ECDSA in lib/nettle/int/dsa-compute-k.c,
      lib/nettle/int/dsa-compute-k.h, lib/nettle/int/ecdsa-compute-k.c,
      lib/nettle/int/ecdsa-compute-k.h, lib/nettle/pk.c,
      tests/sign-verify-deterministic.c.
    - CVE-2024-28834
  * SECURITY UPDATE: crash via specially-crafted cert bundle
    - debian/patches/CVE-2024-28835.patch: remove length limit of input in
      lib/gnutls_int.h, lib/x509/common.c, lib/x509/verify-high.c,
      tests/test-chains.h.
    - CVE-2024-28835

 -- Marc Deslauriers <email address hidden> Fri, 12 Apr 2024 09:51:00 -0400

Source diff to previous version
CVE-2024-28834 A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading
CVE-2024-28835 A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "c

Version: 3.7.3-4ubuntu1.4 2024-01-22 15:07:08 UTC

  gnutls28 (3.7.3-4ubuntu1.4) jammy-security; urgency=medium

  * SECURITY UPDATE: timing side-channel attack in the RSA-PSK key exchange
    - debian/patches/CVE-2024-0553.patch: minimize branching after
      decryption in lib/auth/rsa_psk.c.
    - CVE-2024-0553
  * SECURITY UPDATE: DoS via certificate chain with distributed trust
    - debian/patches/CVE-2024-0567.patch: detect loop in certificate chain
      in lib/x509/common.c, tests/test-chains.h.
    - CVE-2024-0567

 -- Marc Deslauriers <email address hidden> Thu, 18 Jan 2024 12:22:01 -0500

Source diff to previous version
CVE-2024-0553 A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertex
CVE-2024-0567 A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when v

Version: 3.7.3-4ubuntu1.3 2023-11-21 16:09:10 UTC

  gnutls28 (3.7.3-4ubuntu1.3) jammy-security; urgency=medium

  * SECURITY UPDATE: timing side-channel inside RSA-PSK key exchange
    - debian/patches/CVE-2023-5981.patch: side-step potential side-channel
      in lib/auth/rsa.c, lib/auth/rsa_psk.c, lib/gnutls_int.h,
      lib/priority.c.
    - CVE-2023-5981

 -- Marc Deslauriers <email address hidden> Fri, 17 Nov 2023 09:19:42 -0500

Source diff to previous version
CVE-2023-5981 ttiming side-channel inside RSA-PSK key exchange

Version: 3.7.3-4ubuntu1.2 2023-02-28 16:09:50 UTC

  gnutls28 (3.7.3-4ubuntu1.2) jammy-security; urgency=medium

  * SECURITY UPDATE: timing sidechannel in RSA decryption
    - debian/patches/CVE-2023-0361-1.patch: side-step potential
      side-channel in lib/auth/rsa.c.
    - debian/patches/CVE-2023-0361-2.patch: remove dead code in
      lib/auth/rsa.c.
    - CVE-2023-0361

 -- Marc Deslauriers <email address hidden> Tue, 14 Feb 2023 16:13:17 -0500

Source diff to previous version
CVE-2023-0361 A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the

Version: 3.7.3-4ubuntu1.1 2022-08-04 18:06:27 UTC

  gnutls28 (3.7.3-4ubuntu1.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Double free in verification of pkcs7 signatures
    - debian/patches/CVE-2022-2509.patch: fix double free during
      gnutls_pkcs7_verify in lib/x509/pkcs7.c,
      tests/pkcs7-verify-double-free.c, tests/Makefile.am.
    - CVE-2022-2509

 -- Marc Deslauriers <email address hidden> Tue, 02 Aug 2022 08:48:56 -0400

CVE-2022-2509 A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_p



About   -   Send Feedback to @ubuntu_updates