Bug 58480 - gnutls28: Multiple issues (5.2)
Summary: gnutls28: Multiple issues (5.2)
Status: CLOSED FIXED
Alias: None
Product: UCS
Classification: Unclassified
Component: Security updates
Version: UCS 5.2
Hardware: All Linux
: P3 normal
Target Milestone: UCS 5.2-2-errata
Assignee: Quality Assurance
QA Contact: Julia Bremer
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2025-07-21 11:07 CEST by Quality Assurance
Modified: 2025-07-23 15:53 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Customer ID:
Max CVSS v3 score: 6.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H) NVD


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2025-07-21 11:07:03 CEST
New Debian gnutls28 3.7.9-2+deb12u5 fixes:
This update addresses the following issues:
3.7.9-2+deb12u5 (Tue, 15 Jul 2025 07:02:19 +0200)
* Cherry-pick fixes from 3.8.10 release: + libgnutls: Fix NULL pointer  dereference when 2nd Client Hello omits PSK Reported by Stefan Bühler.  [GNUTLS-SA-2025-07-07-4, CVSS: medium] [CVE-2025-6395] + libgnutls: Fix  heap read buffer overrun in parsing X.509 SCTS timestamps Spotted by  oss-fuzz and reported by OpenAI Security Research Team, and fix developed  by Andrew Hamilton. [GNUTLS-SA-2025-07-07-1, CVSS: medium] [CVE-2025-32989]  + libgnutls: Fix double-free upon error when exporting otherName in SAN  Reported by OpenAI Security Research Team. [GNUTLS-SA-2025-07-07-2, CVSS:  low] [CVE-2025-32988] + certtool: Fix 1-byte write buffer overrun when  parsing template Reported by David Aitel. [GNUTLS-SA-2025-07-07-3, CVSS:  low] [CVE-2025-32990] + Fixes for memory leaks in lib/x509/x509_ext.c  andlib/hello_ext.c. + Fix uninitialized memory read while processing the  "pre_shared_key" extension in TLS 1.3. + Avoid uninitialized use of crq  version.
Comment 1 Quality Assurance univentionstaff 2025-07-21 12:00:08 CEST
--- mirror/ftp/pool/main/g/gnutls28/gnutls28_3.7.9-2+deb12u4.dsc
+++ apt/ucs_5.2-0-errata5.2-2/source/gnutls28_3.7.9-2+deb12u5.dsc
@@ -1,3 +1,24 @@
+3.7.9-2+deb12u5 [Tue, 15 Jul 2025 07:02:19 +0200] Andreas Metzler <ametzler@debian.org>:
+
+  * Cherry-pick fixes from 3.8.10 release:
+     + libgnutls: Fix NULL pointer dereference when 2nd Client Hello omits
+       PSK Reported by Stefan Bühler.
+       [GNUTLS-SA-2025-07-07-4, CVSS: medium] [CVE-2025-6395]
+     + libgnutls: Fix heap read buffer overrun in parsing X.509 SCTS
+       timestamps Spotted by oss-fuzz and reported by OpenAI Security
+       Research Team, and fix developed by Andrew Hamilton.
+       [GNUTLS-SA-2025-07-07-1, CVSS: medium] [CVE-2025-32989]
+     + libgnutls: Fix double-free upon error when exporting otherName in
+       SAN Reported by OpenAI Security Research Team.
+       [GNUTLS-SA-2025-07-07-2, CVSS: low] [CVE-2025-32988]
+     + certtool: Fix 1-byte write buffer overrun when parsing template
+       Reported by David Aitel. [GNUTLS-SA-2025-07-07-3, CVSS: low]
+       [CVE-2025-32990]
+     + Fixes for memory leaks in lib/x509/x509_ext.c andlib/hello_ext.c.
+     + Fix uninitialized memory read while processing the "pre_shared_key"
+       extension in TLS 1.3.
+     + Avoid uninitialized use of crq version.
+
 3.7.9-2+deb12u4 [Mon, 10 Feb 2025 10:07:24 +0100] Andreas Metzler <ametzler@debian.org>:
 
   *  libgnutls: Fix potential DoS in handling certificates with numerous

<http://piuparts.knut.univention.de/5.2-2/#7015626342351362776>
Comment 2 Julia Bremer univentionstaff 2025-07-23 13:17:31 CEST
OK: bug
OK: yaml
OK: announce_errata
OK: patch
OK: piuparts

Verified