UbuntuUpdates.org

Package "libgnutls28-dev"

Name: libgnutls28-dev

Description:

GNU TLS library - development files

Latest version: 3.8.9-2ubuntu3.1
Release: plucky (25.04)
Level: updates
Repository: main
Head package: gnutls28
Homepage: https://www.gnutls.org/

Links


Download "libgnutls28-dev"


Other versions of "libgnutls28-dev" in Plucky

Repository Area Version
base main 3.8.9-2ubuntu3
security main 3.8.9-2ubuntu3.1

Changelog

Version: 3.8.9-2ubuntu3.1 2025-07-14 23:10:01 UTC

  gnutls28 (3.8.9-2ubuntu3.1) plucky-security; urgency=medium

  * SECURITY UPDATE: double-free via otherName in the SAN
    - debian/patches/CVE-2025-32988.patch: avoid double free when exporting
      othernames in SAN in lib/x509/extensions.c.
    - CVE-2025-32988
  * SECURITY UPDATE: OOB read via malformed length field in SCT extension
    - debian/patches/CVE-2025-32989.patch: fix read buffer overrun in SCT
      timestamps in lib/x509/x509_ext.c.
    - CVE-2025-32989
  * SECURITY UPDATE: heap write overflow in certtool via invalid template
    - debian/patches/CVE-2025-32990.patch: avoid 1-byte write buffer
      overrun when parsing template in src/certtool-cfg.c,
      tests/cert-tests/Makefile.am, tests/cert-tests/template-test.sh,
      tests/cert-tests/templates/template-too-many-othernames.tmpl.
    - CVE-2025-32990
  * SECURITY UPDATE: NULL deref via missing PSK in TLS 1.3 handshake
    - debian/patches/CVE-2025-6395.patch: clear HSK_PSK_SELECTED when
      resetting binders in lib/handshake.c, lib/state.c, tests/Makefile.am,
      tests/tls13/hello_retry_request_psk.c.
    - CVE-2025-6395

 -- Marc Deslauriers <email address hidden> Fri, 11 Jul 2025 08:32:46 -0400

CVE-2025-32988 A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternati
CVE-2025-32989 A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) exten
CVE-2025-32990 A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads ce
CVE-2025-6395 A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite(). When it reads certain settings from a templa



About   -   Send Feedback to @ubuntu_updates