|
gnutls28 (3.7.3-4ubuntu1.9) jammy-security; urgency=medium
* SECURITY UPDATE: buffer overflow in DTLS handshake fragment reassembly
- debian/patches/CVE-2026-33846-pre1.patch: buffers: shorten
merge_handshake_packet using recv_buf in lib/buffers.c.
- debian/patches/CVE-2026-33846.patch: buffers: add more checks to DTLS
reassembly in lib/buffers.c.
- CVE-2026-33846
* SECURITY UPDATE: DTLS packets sequence number ordering issue
- debian/patches/CVE-2026-42009-pre1.patch: buffers: match DTLS datagrams by
sequence number in lib/buffers.c.
- debian/patches/CVE-2026-42009-1.patch: lib/buffers: ensure packets have
differing sequence numbers in lib/buffers.c.
- debian/patches/CVE-2026-42009-2.patch: buffers: fix handshake_compare when
sequence numbers match in lib/buffers.c.
- CVE-2026-42009
* SECURITY UPDATE: OOB read via malformed fragments with zero length and
non-zero offset
- debian/patches/CVE-2026-33845-pre1.patch: buffers: rename a variable in
parse_handshake_header in lib/buffers.c.
- debian/patches/CVE-2026-33845.patch: buffers: switch from end_offset over
to frag_length in lib/buffers.c, lib/gnutls_int.h.
- debian/patches/CVE-2026-33845-2.patch: buffers: simplify and tighten
parse_handshake_header checks in lib/buffers.c.
- CVE-2026-33845
* SECURITY UPDATE: malformed OCSP response issue
- debian/patches/CVE-2026-3832-pre1.patch: iterate ocsp response records
for matching certificate in doc/examples/ex-ocsp-client.c,
lib/cert-session.c, lib/ocsp-api.c, src/ocsptool-common.c.
- debian/patches/CVE-2026-3832-pre2.patch: fix formatting in
doc/examples/ex-ocsp-client.c, lib/cert-session.c, lib/ocsp-api.c,
src/ocsptool-common.c.
- debian/patches/CVE-2026-3832.patch: cert-session: fix multi-entry OCSP
revocation bypass in lib/cert-session.c.
- CVE-2026-3832
* SECURITY UPDATE: policy bypass via x509 case-sensitive comparisons
- debian/patches/CVE-2026-3833.patch: x509/name-constraints: compare domain
names case-insensitive in lib/x509/name_constraints.c.
- CVE-2026-3833
* SECURITY UPDATE: permitted name constrains were incorrectly ignored
- debian/patches/CVE-2026-42011.patch: x509/name_constraints: fix
intersecting empty constraints in lib/x509/name_constraints.c.
- CVE-2026-42011
* SECURITY UPDATE:
- debian/patches/CVE-2026-42010.patch: lib/auth/rsa_psk: fix binary PSK
identity lookup in lib/auth/rsa_psk.c.
- CVE-2026-42010
* SECURITY UPDATE: incorrect username parsing with NUL characters
- debian/patches/CVE-2026-5260-1.patch: lib/auth/rsa: check that ciphertext
matches the modulus size in lib/auth/rsa.c, lib/auth/rsa_psk.c.
- debian/patches/CVE-2026-5260-2.patch: lib/pkcs11_privkey: guard against
overreading on short ciphertexts in lib/pkcs11_privkey.c.
- CVE-2026-5260
* SECURITY UPDATE:
- debian/patches/CVE-2026-42012-pre1.patch: x509/hostname-verify: refactor
and simplify CN fallback logic in lib/x509/hostname-verify.c.
- debian/patches/CVE-2026-42012-pre2.patch: Fix for #1132 in
lib/includes/gnutls/gnutls.h.in, lib/x509/common.h,
lib/x509/name_constraints.c, lib/x509/output.c, lib/x509/virt-san.c,
lib/x509/x509.c, tests/Makefile.am, tests/x509-upnconstraint.c.
- debian/patches/CVE-2026-42012-pre3.patch: x509: add bare-bones awareness
of SRV virtual SAN in lib/includes/gnutls/gnutls.h.in, lib/x509/common.h,
lib/x509/name_constraints.c, lib/x509/output.c, lib/x509/virt-san.c,
lib/x509/x509.c.
- debian/patches/CVE-2026-42012-pre4.patch: datum, mem, str: add helper
functions to steal pointers in lib/datum.h, lib/mem.h, lib/str.h.
- debian/patches/CVE-2026-42012.patch: x509/hostname-verify: make URI/SRV
SAN preclude CN fallback in lib/x509/hostname-verify.c.
- CVE-2026-42012
* SECURITY UPDATE: incorrect URI or SRV Subject Alternative Names checking
- debian/patches/CVE-2026-42013-pre1.patch: x509/email-verify: call
fallback DN fallback in lib/x509/email-verify.c.
- debian/patches/CVE-2026-42013.patch: x509: prevent fallback on oversized
SAN in lib/x509/email-verify.c, lib/x509/hostname-verify.c.
- CVE-2026-42013
* SECURITY UPDATE: UaF when changing the Security Officer PIN
- debian/patches/CVE-2026-42014.patch: pkcs11_write: fix UAF and leak in
gnutls_pkcs11_token_set_pin in lib/pkcs11_write.c.
- CVE-2026-42014
* SECURITY UPDATE: buffer overflow when appending to a PKCS#12 bag
- debian/patches/CVE-2026-42015.patch: x509/pkcs12_bag: fix off-by-one in
bag element bounds check in lib/x509/pkcs12_bag.c.
- CVE-2026-42015
-- Marc Deslauriers <email address hidden> Fri, 08 May 2026 14:50:04 -0400
|