First published: Wed Feb 13 2019(Updated: )
A flaw was found in gnutls 3.5.8 or later. A use-after-free in multi-threaded-clients and a double-free vulnerability in single-threaded clients because _gnutls_x509_get_signature does not clear signature->data in the cleanup path. Upstream bug: <a href="https://gitlab.com/gnutls/gnutls/issues/694">https://gitlab.com/gnutls/gnutls/issues/694</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gnutls | <3.6.7 | 3.6.7 |
GNU GnuTLS | >=3.5.8<3.6.7 | |
Fedoraproject Fedora | ||
debian/gnutls28 | 3.7.1-5+deb11u5 3.7.1-5+deb11u6 3.7.9-2+deb12u3 3.8.8-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3829 is a memory corruption vulnerability in gnutls versions from 3.5.8 before 3.6.7.
Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected.
CVE-2019-3829 has a high severity with a CVSS score of 7.5.
To fix CVE-2019-3829, update to gnutls version 3.6.7 or later.
You can find more information about CVE-2019-3829 at the following references: [1](http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html), [2](https://access.redhat.com/errata/RHSA-2019:3600), [3](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3829).