UbuntuUpdates.org

Package "libgnutls30"

Name: libgnutls30

Description:

GNU TLS library - main runtime library

Latest version: 3.7.3-4ubuntu1.7
Release: jammy (22.04)
Level: updates
Repository: main
Head package: gnutls28
Homepage: https://www.gnutls.org/

Links


Download "libgnutls30"


Other versions of "libgnutls30" in Jammy

Repository Area Version
base main 3.7.3-4ubuntu1
security main 3.7.3-4ubuntu1.7

Changelog

Version: 3.7.3-4ubuntu1.7 2025-07-14 23:09:17 UTC

  gnutls28 (3.7.3-4ubuntu1.7) jammy-security; urgency=medium

  * SECURITY UPDATE: double-free via otherName in the SAN
    - debian/patches/CVE-2025-32988.patch: avoid double free when exporting
      othernames in SAN in lib/x509/extensions.c.
    - CVE-2025-32988
  * SECURITY UPDATE: OOB read via malformed length field in SCT extension
    - debian/patches/CVE-2025-32989.patch: fix read buffer overrun in SCT
      timestamps in lib/x509/x509_ext.c.
    - CVE-2025-32989
  * SECURITY UPDATE: heap write overflow in certtool via invalid template
    - debian/patches/CVE-2025-32990.patch: avoid 1-byte write buffer
      overrun when parsing template in src/certtool-cfg.c,
      tests/cert-tests/Makefile.am, tests/cert-tests/template-test.sh,
      tests/cert-tests/templates/template-too-many-othernames.tmpl.
    - CVE-2025-32990
  * SECURITY UPDATE: NULL deref via missing PSK in TLS 1.3 handshake
    - debian/patches/CVE-2025-6395.patch: clear HSK_PSK_SELECTED when
      resetting binders in lib/handshake.c, lib/state.c, tests/Makefile.am,
      tests/tls13/hello_retry_request_psk.c.
    - CVE-2025-6395

 -- Marc Deslauriers <email address hidden> Fri, 11 Jul 2025 09:13:17 -0400

Source diff to previous version
CVE-2025-32988 A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternati
CVE-2025-32989 A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) exten
CVE-2025-32990 A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads ce
CVE-2025-6395 A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite(). When it reads certain settings from a templa

Version: 3.7.3-4ubuntu1.6 2025-02-21 02:06:59 UTC

  gnutls28 (3.7.3-4ubuntu1.6) jammy-security; urgency=medium

  * SECURITY UPDATE: resource consumption issue when decoding DER-encoded
    certificate data
    - debian/patches/CVE-2024-12243.patch: optimize name constraints
      processing in lib/datum.c, lib/x509/name_constraints.c,
      lib/x509/x509_ext.c, lib/x509/x509_ext_int.h, lib/x509/x509_int.h.
    - CVE-2024-12243

 -- Marc Deslauriers <email address hidden> Wed, 12 Feb 2025 10:33:01 -0500

Source diff to previous version
CVE-2024-12243 A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-enc

Version: 3.7.3-4ubuntu1.5 2024-04-15 20:06:57 UTC

  gnutls28 (3.7.3-4ubuntu1.5) jammy-security; urgency=medium

  * SECURITY UPDATE: side-channel leak via Minerva attack
    - debian/patches/CVE-2024-28834.patch: avoid normalization of mpz_t in
      deterministic ECDSA in lib/nettle/int/dsa-compute-k.c,
      lib/nettle/int/dsa-compute-k.h, lib/nettle/int/ecdsa-compute-k.c,
      lib/nettle/int/ecdsa-compute-k.h, lib/nettle/pk.c,
      tests/sign-verify-deterministic.c.
    - CVE-2024-28834
  * SECURITY UPDATE: crash via specially-crafted cert bundle
    - debian/patches/CVE-2024-28835.patch: remove length limit of input in
      lib/gnutls_int.h, lib/x509/common.c, lib/x509/verify-high.c,
      tests/test-chains.h.
    - CVE-2024-28835

 -- Marc Deslauriers <email address hidden> Fri, 12 Apr 2024 09:51:00 -0400

Source diff to previous version
CVE-2024-28834 A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading
CVE-2024-28835 A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "c

Version: 3.7.3-4ubuntu1.4 2024-01-22 18:07:11 UTC

  gnutls28 (3.7.3-4ubuntu1.4) jammy-security; urgency=medium

  * SECURITY UPDATE: timing side-channel attack in the RSA-PSK key exchange
    - debian/patches/CVE-2024-0553.patch: minimize branching after
      decryption in lib/auth/rsa_psk.c.
    - CVE-2024-0553
  * SECURITY UPDATE: DoS via certificate chain with distributed trust
    - debian/patches/CVE-2024-0567.patch: detect loop in certificate chain
      in lib/x509/common.c, tests/test-chains.h.
    - CVE-2024-0567

 -- Marc Deslauriers <email address hidden> Thu, 18 Jan 2024 12:22:01 -0500

Source diff to previous version
CVE-2024-0553 A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertex
CVE-2024-0567 A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when v

Version: 3.7.3-4ubuntu1.3 2023-11-21 18:07:06 UTC

  gnutls28 (3.7.3-4ubuntu1.3) jammy-security; urgency=medium

  * SECURITY UPDATE: timing side-channel inside RSA-PSK key exchange
    - debian/patches/CVE-2023-5981.patch: side-step potential side-channel
      in lib/auth/rsa.c, lib/auth/rsa_psk.c, lib/gnutls_int.h,
      lib/priority.c.
    - CVE-2023-5981

 -- Marc Deslauriers <email address hidden> Fri, 17 Nov 2023 09:19:42 -0500

CVE-2023-5981 ttiming side-channel inside RSA-PSK key exchange



About   -   Send Feedback to @ubuntu_updates