UbuntuUpdates.org

Package "libgnutls-dane0"

Name: libgnutls-dane0

Description:

GNU TLS library - DANE security support

Latest version: 3.6.13-2ubuntu1.12
Release: focal (20.04)
Level: security
Repository: main
Head package: gnutls28
Homepage: https://www.gnutls.org/

Links


Download "libgnutls-dane0"


Other versions of "libgnutls-dane0" in Focal

Repository Area Version
base main 3.6.13-2ubuntu1
updates main 3.6.13-2ubuntu1.12

Changelog

Version: 3.6.13-2ubuntu1.7 2022-08-04 18:06:24 UTC

  gnutls28 (3.6.13-2ubuntu1.7) focal-security; urgency=medium

  * SECURITY UPDATE: Null pointer dereference in MD_UPDATE
    - debian/patches/CVE-2021-4209.patch: avoid calling _update with
      zero-length input in lib/nettle/mac.c.
    - CVE-2021-4209
  * SECURITY UPDATE: Double free in verification of pkcs7 signatures
    - debian/patches/CVE-2022-2509.patch: fix double free during
      gnutls_pkcs7_verify in lib/x509/pkcs7.c,
      tests/pkcs7-verify-double-free.c, tests/Makefile.am.
    - CVE-2022-2509

 -- Marc Deslauriers <email address hidden> Tue, 02 Aug 2022 08:50:52 -0400

Source diff to previous version
CVE-2022-2509 A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_p

Version: 3.6.13-2ubuntu1.6 2021-08-02 19:06:27 UTC

  gnutls28 (3.6.13-2ubuntu1.6) focal-security; urgency=medium

  * SECURITY UPDATE: use after free issue in key_share extension
    - debian/patches/CVE-2021-20231.patch: avoid use-after-free around
      realloc in lib/ext/key_share.c.
    - CVE-2021-20231
  * SECURITY UPDATE: use after free issue in client_send_params
    - debian/patches/CVE-2021-20232.patch: avoid use-after-free around
      realloc in lib/ext/pre_shared_key.c.
    - CVE-2021-20232

 -- Marc Deslauriers <email address hidden> Mon, 02 Aug 2021 09:56:04 -0400

Source diff to previous version
CVE-2021-20231 A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.
CVE-2021-20232 A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potentia

Version: 3.6.13-2ubuntu1.3 2020-09-09 12:06:46 UTC

  gnutls28 (3.6.13-2ubuntu1.3) focal-security; urgency=medium

  * SECURITY UPDATE: null pointer deref via no_renegotiation alert
    - debian/patches/CVE-2020-24659.patch: reject no_renegotiation alert if
      handshake is incomplete in lib/gnutls_int.h, lib/handshake.c.
    - CVE-2020-24659

 -- Marc Deslauriers <email address hidden> Tue, 08 Sep 2020 10:07:34 -0400

Source diff to previous version
CVE-2020-24659 An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is s

Version: 3.6.13-2ubuntu1.1 2020-06-05 19:06:35 UTC

  gnutls28 (3.6.13-2ubuntu1.1) focal-security; urgency=medium

  * SECURITY UPDATE: flaw in TLS session ticket key construction
    - debian/patches/CVE-2020-13777.patch: differentiate initial state from
      valid time window of TOTP in lib/stek.c,
      tests/resume-with-previous-stek.c, tests/tls13/prf-early.c.
    - CVE-2020-13777

 -- Marc Deslauriers <email address hidden> Fri, 05 Jun 2020 07:18:21 -0400

CVE-2020-13777 GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting ...



About   -   Send Feedback to @ubuntu_updates