UbuntuUpdates.org

Package "gnutls28"

Name: gnutls28

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • GNU TLS library - documentation and examples
  • GNU TLS library - DANE security support
  • GNU TLS library - OpenSSL wrapper
  • GNU TLS library - development files

Latest version: 3.6.13-2ubuntu1.11
Release: focal (20.04)
Level: updates
Repository: main

Links



Other versions of "gnutls28" in Focal

Repository Area Version
base main 3.6.13-2ubuntu1
base universe 3.6.13-2ubuntu1
security main 3.6.13-2ubuntu1.11
security universe 3.6.13-2ubuntu1.11
updates universe 3.6.13-2ubuntu1.11

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.6.13-2ubuntu1.6 2021-08-02 19:06:28 UTC

  gnutls28 (3.6.13-2ubuntu1.6) focal-security; urgency=medium

  * SECURITY UPDATE: use after free issue in key_share extension
    - debian/patches/CVE-2021-20231.patch: avoid use-after-free around
      realloc in lib/ext/key_share.c.
    - CVE-2021-20231
  * SECURITY UPDATE: use after free issue in client_send_params
    - debian/patches/CVE-2021-20232.patch: avoid use-after-free around
      realloc in lib/ext/pre_shared_key.c.
    - CVE-2021-20232

 -- Marc Deslauriers <email address hidden> Mon, 02 Aug 2021 09:56:04 -0400

Source diff to previous version
CVE-2021-20231 A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.
CVE-2021-20232 A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potentia

Version: 3.6.13-2ubuntu1.3 2020-09-09 13:07:03 UTC

  gnutls28 (3.6.13-2ubuntu1.3) focal-security; urgency=medium

  * SECURITY UPDATE: null pointer deref via no_renegotiation alert
    - debian/patches/CVE-2020-24659.patch: reject no_renegotiation alert if
      handshake is incomplete in lib/gnutls_int.h, lib/handshake.c.
    - CVE-2020-24659

 -- Marc Deslauriers <email address hidden> Tue, 08 Sep 2020 10:07:34 -0400

Source diff to previous version
CVE-2020-24659 An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is s

Version: 3.6.13-2ubuntu1.2 2020-07-02 15:08:03 UTC

  gnutls28 (3.6.13-2ubuntu1.2) focal; urgency=medium

  * d/p/50_Update-session_ticket.c-to-add-support-for-zero-leng.patch
    Handle zero length session tickets, fixing connection errors on
    TLS1.2 sessions to some big hosting providers. (LP: #1876286)

 -- Sebastien Bacher <email address hidden> Mon, 15 Jun 2020 17:10:12 +0200

Source diff to previous version

Version: 3.6.13-2ubuntu1.1 2020-06-05 19:06:35 UTC

  gnutls28 (3.6.13-2ubuntu1.1) focal-security; urgency=medium

  * SECURITY UPDATE: flaw in TLS session ticket key construction
    - debian/patches/CVE-2020-13777.patch: differentiate initial state from
      valid time window of TOTP in lib/stek.c,
      tests/resume-with-previous-stek.c, tests/tls13/prf-early.c.
    - CVE-2020-13777

 -- Marc Deslauriers <email address hidden> Fri, 05 Jun 2020 07:18:21 -0400

CVE-2020-13777 GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting ...



About   -   Send Feedback to @ubuntu_updates