UbuntuUpdates.org

Package "gnutls28"

Name: gnutls28

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • GNU TLS library - documentation and examples
  • GNU TLS library - DANE security support
  • GNU TLS library - OpenSSL wrapper
  • GNU TLS library - development files

Latest version: 3.8.3-1.1ubuntu3.6
Release: noble (24.04)
Level: security
Repository: main

Links



Other versions of "gnutls28" in Noble

Repository Area Version
base universe 3.8.3-1.1ubuntu3
base main 3.8.3-1.1ubuntu3
security universe 3.8.3-1.1ubuntu3.6
updates main 3.8.3-1.1ubuntu3.6
updates universe 3.8.3-1.1ubuntu3.6

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.8.3-1.1ubuntu3.6 2026-05-20 14:07:35 UTC

  gnutls28 (3.8.3-1.1ubuntu3.6) noble-security; urgency=medium

  * SECURITY UPDATE: buffer overflow in DTLS handshake fragment reassembly
    - debian/patches/CVE-2026-33846-pre1.patch: buffers: shorten
      merge_handshake_packet using recv_buf in lib/buffers.c.
    - debian/patches/CVE-2026-33846.patch: buffers: add more checks to DTLS
      reassembly in lib/buffers.c.
    - CVE-2026-33846
  * SECURITY UPDATE: DTLS packets sequence number ordering issue
    - debian/patches/CVE-2026-42009-pre1.patch: buffers: match DTLS datagrams by
      sequence number in lib/buffers.c.
    - debian/patches/CVE-2026-42009-1.patch: lib/buffers: ensure packets have
      differing sequence numbers in lib/buffers.c.
    - debian/patches/CVE-2026-42009-2.patch: buffers: fix handshake_compare when
      sequence numbers match in lib/buffers.c.
    - CVE-2026-42009
  * SECURITY UPDATE: OOB read via malformed fragments with zero length and
    non-zero offset
    - debian/patches/CVE-2026-33845-pre1.patch: buffers: rename a variable in
      parse_handshake_header in lib/buffers.c.
    - debian/patches/CVE-2026-33845.patch: buffers: switch from end_offset over
      to frag_length in lib/buffers.c, lib/gnutls_int.h.
    - debian/patches/CVE-2026-33845-2.patch: buffers: simplify and tighten
      parse_handshake_header checks in lib/buffers.c.
    - CVE-2026-33845
  * SECURITY UPDATE: malformed OCSP response issue
    - debian/patches/CVE-2026-3832-pre1.patch: iterate ocsp response records
      for matching certificate in doc/examples/ex-ocsp-client.c,
      lib/cert-session.c, lib/ocsp-api.c, src/ocsptool-common.c.
    - debian/patches/CVE-2026-3832-pre2.patch: fix formatting in
      doc/examples/ex-ocsp-client.c, lib/cert-session.c, lib/ocsp-api.c,
      src/ocsptool-common.c.
    - debian/patches/CVE-2026-3832.patch: cert-session: fix multi-entry OCSP
      revocation bypass in lib/cert-session.c.
    - CVE-2026-3832
  * SECURITY UPDATE: policy bypass via x509 case-sensitive comparisons
    - debian/patches/CVE-2026-3833.patch: x509/name-constraints: compare domain
      names case-insensitive in lib/x509/name_constraints.c.
    - CVE-2026-3833
  * SECURITY UPDATE: permitted name constrains were incorrectly ignored
    - debian/patches/CVE-2026-42011.patch: x509/name_constraints: fix
      intersecting empty constraints in lib/x509/name_constraints.c.
    - CVE-2026-42011
  * SECURITY UPDATE:
    - debian/patches/CVE-2026-42010.patch: lib/auth/rsa_psk: fix binary PSK
      identity lookup in lib/auth/rsa_psk.c.
    - CVE-2026-42010
  * SECURITY UPDATE: incorrect username parsing with NUL characters
    - debian/patches/CVE-2026-5260-1.patch: lib/auth/rsa: check that ciphertext
      matches the modulus size in lib/auth/rsa.c, lib/auth/rsa_psk.c.
    - debian/patches/CVE-2026-5260-2.patch: lib/pkcs11_privkey: guard against
      overreading on short ciphertexts in lib/pkcs11_privkey.c.
    - CVE-2026-5260
  * SECURITY UPDATE:
    - debian/patches/CVE-2026-42012-pre1.patch: x509/hostname-verify: refactor
      and simplify CN fallback logic in lib/x509/hostname-verify.c.
    - debian/patches/CVE-2026-42012-pre2.patch: x509: add bare-bones awareness
      of SRV virtual SAN in lib/includes/gnutls/gnutls.h.in, lib/x509/common.h,
      lib/x509/name_constraints.c, lib/x509/output.c, lib/x509/virt-san.c,
      lib/x509/x509.c.
    - debian/patches/CVE-2026-42012-pre3.patch: datum, mem, str: add helper
      functions to steal pointers in lib/datum.h, lib/mem.h, lib/str.h.
    - debian/patches/CVE-2026-42012.patch: x509/hostname-verify: make URI/SRV
      SAN preclude CN fallback in lib/x509/hostname-verify.c.
    - CVE-2026-42012
  * SECURITY UPDATE: incorrect URI or SRV Subject Alternative Names checking
    - debian/patches/CVE-2026-42013-pre1.patch: x509/email-verify: call
      fallback DN fallback in lib/x509/email-verify.c.
    - debian/patches/CVE-2026-42013.patch: x509: prevent fallback on oversized
      SAN in lib/x509/email-verify.c, lib/x509/hostname-verify.c.
    - CVE-2026-42013
  * SECURITY UPDATE: UaF when changing the Security Officer PIN
    - debian/patches/CVE-2026-42014.patch: pkcs11_write: fix UAF and leak in
      gnutls_pkcs11_token_set_pin in lib/pkcs11_write.c.
    - CVE-2026-42014
  * SECURITY UPDATE: buffer overflow when appending to a PKCS#12 bag
    - debian/patches/CVE-2026-42015.patch: x509/pkcs12_bag: fix off-by-one in
      bag element bounds check in lib/x509/pkcs12_bag.c.
    - CVE-2026-42015
  * SECURITY UPDATE: non constant-time PKCS#7 padding check
    - debian/patches/CVE-2026-5419.patch: gnutls_cipher_decrypt3: make PKCS#7
      unpadding branch free in lib/crypto-api.c, lib/libgnutls.map,
      tests/Makefile.am, tests/pkcs7-pad.c.
    - debian/patches/CVE-2026-5419-2.patch: _gnutls_pkcs7_unpad: add missing
      declaration in lib/crypto-api.c.
    - CVE-2026-5419

 -- Marc Deslauriers <email address hidden> Fri, 08 May 2026 12:59:02 -0400

Source diff to previous version
CVE-2026-33846 A heap buffer overflow vulnerability exists in the DTLS handshake fragment reassembly logic of GnuTLS. The issue arises in merge_handshake_packet() w
CVE-2026-42009 A flaw was found in gnutls. A remote attacker could exploit an issue in the Datagram Transport Layer Security (DTLS) packet reordering logic. The com
CVE-2026-33845 A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reass
CVE-2026-3832 A flaw was found in gnutls. A remote attacker could exploit this vulnerability by presenting a specially crafted Online Certificate Status Protocol (
CVE-2026-3833 A flaw was found in gnutls. This vulnerability occurs because gnutls performs case-sensitive comparisons of `nameConstraints` labels, specifically fo
CVE-2026-42011 A flaw was found in gnutls. This vulnerability occurs because permitted name constraints were incorrectly ignored when previous Certificate Authoriti
CVE-2026-42010 A flaw was found in gnutls. Servers configured with RSA-PSK (Rivest–Shamir–Adleman – Pre-Shared Key) wrongfully matched usernames containing a NUL ch

Version: 3.8.3-1.1ubuntu3.5 2026-02-16 16:07:56 UTC

  gnutls28 (3.8.3-1.1ubuntu3.5) noble-security; urgency=medium

  * SECURITY UPDATE: DoS via malicious certificates
    - debian/patches/CVE-2025-14831-*.patch: rework processing algorithms
      to exhibit better performance characteristics in
      lib/x509/name_constraints.c, tests/name-constraints-ip.c.
    - CVE-2025-14831
  * SECURITY UPDATE: stack overflow via long token label
    - debian/patches/CVE-2025-9820.patch: avoid stack overwrite when
      initializing a token in lib/pkcs11_write.c, tests/Makefile.am,
      tests/pkcs11/long-label.c.
    - CVE-2025-9820

 -- Marc Deslauriers <email address hidden> Tue, 10 Feb 2026 11:09:12 -0500

Source diff to previous version
CVE-2025-14831 A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via
CVE-2025-9820 A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a tok

Version: 3.8.3-1.1ubuntu3.4 2025-07-14 23:09:39 UTC

  gnutls28 (3.8.3-1.1ubuntu3.4) noble-security; urgency=medium

  * SECURITY UPDATE: double-free via otherName in the SAN
    - debian/patches/CVE-2025-32988.patch: avoid double free when exporting
      othernames in SAN in lib/x509/extensions.c.
    - CVE-2025-32988
  * SECURITY UPDATE: OOB read via malformed length field in SCT extension
    - debian/patches/CVE-2025-32989.patch: fix read buffer overrun in SCT
      timestamps in lib/x509/x509_ext.c.
    - CVE-2025-32989
  * SECURITY UPDATE: heap write overflow in certtool via invalid template
    - debian/patches/CVE-2025-32990.patch: avoid 1-byte write buffer
      overrun when parsing template in src/certtool-cfg.c,
      tests/cert-tests/Makefile.am, tests/cert-tests/template-test.sh,
      tests/cert-tests/templates/template-too-many-othernames.tmpl.
    - CVE-2025-32990
  * SECURITY UPDATE: NULL deref via missing PSK in TLS 1.3 handshake
    - debian/patches/CVE-2025-6395.patch: clear HSK_PSK_SELECTED when
      resetting binders in lib/handshake.c, lib/state.c, tests/Makefile.am,
      tests/tls13/hello_retry_request_psk.c.
    - CVE-2025-6395

 -- Marc Deslauriers <email address hidden> Fri, 11 Jul 2025 08:58:05 -0400

Source diff to previous version
CVE-2025-32988 A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternati
CVE-2025-32989 A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) exten
CVE-2025-32990 A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads ce
CVE-2025-6395 A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite(). When it reads certain settings from a templa

Version: 3.8.3-1.1ubuntu3.3 2025-02-20 23:07:28 UTC

  gnutls28 (3.8.3-1.1ubuntu3.3) noble-security; urgency=medium

  * SECURITY UPDATE: resource consumption issue when decoding DER-encoded
    certificate data
    - debian/patches/CVE-2024-12243.patch: optimize name constraints
      processing in lib/datum.c, lib/x509/name_constraints.c,
      lib/x509/x509_ext.c, lib/x509/x509_ext_int.h, lib/x509/x509_int.h.
    - CVE-2024-12243

 -- Marc Deslauriers <email address hidden> Wed, 12 Feb 2025 09:55:11 -0500

Source diff to previous version
CVE-2024-12243 A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-enc

Version: 3.8.3-1.1ubuntu3.1 2024-04-29 13:07:04 UTC

  gnutls28 (3.8.3-1.1ubuntu3.1) noble-security; urgency=medium

  * SECURITY UPDATE: side-channel leak via Minerva attack
    - debian/patches/CVE-2024-28834.patch: avoid normalization of mpz_t in
      deterministic ECDSA in lib/nettle/int/dsa-compute-k.c,
      lib/nettle/int/dsa-compute-k.h, lib/nettle/int/ecdsa-compute-k.c,
      lib/nettle/int/ecdsa-compute-k.h, lib/nettle/pk.c,
      tests/sign-verify-deterministic.c.
    - CVE-2024-28834
  * SECURITY UPDATE: crash via specially-crafted cert bundle
    - debian/patches/CVE-2024-28835.patch: remove length limit of input in
      lib/gnutls_int.h, lib/x509/common.c, lib/x509/verify-high.c,
      tests/test-chains.h.
    - CVE-2024-28835

 -- Marc Deslauriers <email address hidden> Thu, 18 Apr 2024 09:54:34 -0400

CVE-2024-28834 A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading
CVE-2024-28835 A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "c



About   -   Send Feedback to @ubuntu_updates