UbuntuUpdates.org

Package "gnutls28"

Name: gnutls28

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • GNU TLS library - documentation and examples
  • GNU TLS library - DANE security support
  • GNU TLS library - OpenSSL wrapper
  • GNU TLS library - development files

Latest version: 3.6.13-2ubuntu1.10
Release: focal (20.04)
Level: updates
Repository: main

Links



Other versions of "gnutls28" in Focal

Repository Area Version
base main 3.6.13-2ubuntu1
base universe 3.6.13-2ubuntu1
security main 3.6.13-2ubuntu1.10
security universe 3.6.13-2ubuntu1.10
updates universe 3.6.13-2ubuntu1.10

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.6.13-2ubuntu1.10 2024-01-22 18:07:00 UTC

  gnutls28 (3.6.13-2ubuntu1.10) focal-security; urgency=medium

  * SECURITY UPDATE: timing side-channel attack in the RSA-PSK key exchange
    - debian/patches/CVE-2024-0553.patch: minimize branching after
      decryption in lib/auth/rsa_psk.c.
    - CVE-2024-0553

 -- Marc Deslauriers <email address hidden> Thu, 18 Jan 2024 12:25:14 -0500

Source diff to previous version
CVE-2024-0553 A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertex

Version: 3.6.13-2ubuntu1.9 2023-11-21 18:07:01 UTC

  gnutls28 (3.6.13-2ubuntu1.9) focal-security; urgency=medium

  * SECURITY UPDATE: timing side-channel inside RSA-PSK key exchange
    - debian/patches/CVE-2023-5981.patch: side-step potential side-channel
      in lib/auth/rsa.c, lib/auth/rsa_psk.c, lib/gnutls_int.h,
      lib/priority.c.
    - CVE-2023-5981

 -- Marc Deslauriers <email address hidden> Fri, 17 Nov 2023 09:20:22 -0500

Source diff to previous version
CVE-2023-5981 ttiming side-channel inside RSA-PSK key exchange

Version: 3.6.13-2ubuntu1.8 2023-02-28 17:06:57 UTC

  gnutls28 (3.6.13-2ubuntu1.8) focal-security; urgency=medium

  * SECURITY UPDATE: timing sidechannel in RSA decryption
    - debian/patches/CVE-2023-0361-1.patch: side-step potential
      side-channel in lib/auth/rsa.c.
    - debian/patches/CVE-2023-0361-2.patch: remove dead code in
      lib/auth/rsa.c.
    - CVE-2023-0361

 -- Marc Deslauriers <email address hidden> Tue, 14 Feb 2023 16:13:51 -0500

Source diff to previous version
CVE-2023-0361 A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the

Version: 3.6.13-2ubuntu1.7 2022-08-04 19:07:53 UTC

  gnutls28 (3.6.13-2ubuntu1.7) focal-security; urgency=medium

  * SECURITY UPDATE: Null pointer dereference in MD_UPDATE
    - debian/patches/CVE-2021-4209.patch: avoid calling _update with
      zero-length input in lib/nettle/mac.c.
    - CVE-2021-4209
  * SECURITY UPDATE: Double free in verification of pkcs7 signatures
    - debian/patches/CVE-2022-2509.patch: fix double free during
      gnutls_pkcs7_verify in lib/x509/pkcs7.c,
      tests/pkcs7-verify-double-free.c, tests/Makefile.am.
    - CVE-2022-2509

 -- Marc Deslauriers <email address hidden> Tue, 02 Aug 2022 08:50:52 -0400

Source diff to previous version
CVE-2022-2509 A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_p

Version: 3.6.13-2ubuntu1.6 2021-08-02 19:06:28 UTC

  gnutls28 (3.6.13-2ubuntu1.6) focal-security; urgency=medium

  * SECURITY UPDATE: use after free issue in key_share extension
    - debian/patches/CVE-2021-20231.patch: avoid use-after-free around
      realloc in lib/ext/key_share.c.
    - CVE-2021-20231
  * SECURITY UPDATE: use after free issue in client_send_params
    - debian/patches/CVE-2021-20232.patch: avoid use-after-free around
      realloc in lib/ext/pre_shared_key.c.
    - CVE-2021-20232

 -- Marc Deslauriers <email address hidden> Mon, 02 Aug 2021 09:56:04 -0400

CVE-2021-20231 A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.
CVE-2021-20232 A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potentia



About   -   Send Feedback to @ubuntu_updates