First published: Mon Aug 01 2022(Updated: )
A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gnutls28 | <=3.6.7-4+deb10u8 | 3.6.7-4+deb10u10 3.7.1-5+deb11u3 3.7.9-2 3.8.1-4 |
GNU GnuTLS | <3.7.7 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2509 is a vulnerability found in gnutls. It is a security flaw that occurs due to a double free error during the verification of pkcs7 signatures in the gnutls_pkcs7_verify function.
CVE-2022-2509 has a severity level of high.
CVE-2022-2509 affects Gnu Gnutls, Redhat Enterprise Linux 8.0 and 9.0, Fedoraproject Fedora 35, and Debian Debian Linux 10.0 and 11.0.
To fix CVE-2022-2509, you should update the gnutls28 package to version 3.7.7 or above on affected systems.
You can find more information about CVE-2022-2509 at the following references: [Red Hat](https://access.redhat.com/security/cve/CVE-2022-2509), [Debian LTS Announcement](https://lists.debian.org/debian-lts-announce/2022/08/msg00002.html), [Fedora Project](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/)