Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <0ac1a299-042a-4bc0-8f2f-3d2b0dd68919@oracle.com>
Date: Mon, 9 Feb 2026 13:36:00 -0800
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: gnutls 3.8.12 fixes CVE-2026-1584 & CVE-2025-14831

[https://gnutls.org/security-new.html does not yet seem to be updated with
information on GNUTLS-SA-2026-02-09-1 & GNUTLS-SA-2026-02-09-2.]


-------- Forwarded Message --------
Subject: gnutls 3.8.12
Date: Mon, 9 Feb 2026 10:25:10 -0600
From: Alexander Sosedkin <asosedkin@...hat.com>
To: gnutls-help@...ts.gnutls.org
CC: info-gnu@....org

Hello,

We have just released gnutls-3.8.12. This is a bug fix, security and
enhancement release on the 3.8.x branch.

We would like to thank everyone who contributed in this release:
Alexander Sosedkin, Daiki Ueno, Mikhail Dmitrichenko, František Krenželok,
Jan Palus, Julien Olivain, Markus Theil, Maxim Cournoyer, xinpeng wang.

The detailed list of changes follows:

* Version 3.8.12 (released 2026-02-09)

** libgnutls: Fix NULL pointer dereference in PSK binder verification
    A TLS 1.3 resumption attempt with an invalid PSK binder value in ClientHello
    could lead to a denial of service attack via crashing the server.
    The updated code guards against the problematic dereference.
    Reported by Jaehun Lee.
    [Fixes: GNUTLS-SA-2026-02-09-1, CVSS: high] [CVE-2026-1584]

** libgnutls: Fix name constraint processing performance issue
    Verifying certificates with pathological amounts of name constraints
    could lead to a denial of service attack via resource exhaustion.
    Reworked processing algorithms exhibit better performance characteristics.
    Reported by Tim Scheckenbach.
    [Fixes: GNUTLS-SA-2026-02-09-2, CVSS: medium] [CVE-2025-14831]

** libgnutls: Fix multiple unexploitable overflows
    Reported by Tim Rühsen (#1783, #1786).

** libgnutls: Fall back to thread-unsafe module initialization
    Improve fallback handling for PKCS#11 modules that
    don't support thread-safe initialization (#1774).
    Also return filename from p11_kit_module_get_name() for unconfigured modules.

** libgnutls: Accept NULL as digest argument for gnutls_hash_output
    The accelerated implementation of gnutls_hash_output() now
    properly accepts NULL as the digest argument, matching the
    behavior of the reference implementation (#1769).

** srptool: Avoid a stack buffer overflow when processing large SRP groups.
    Reported and fixed by Mikhail Dmitrichenko (#1777).

** API and ABI modifications:
No changes since last version.


Getting the Software
================

GnuTLS may be downloaded directly from
https://www.gnupg.org/ftp/gcrypt/
A list of GnuTLS mirrors can be found at
http://www.gnutls.org/download.html

Here are the XZ compressed sources:
https://www.gnupg.org/ftp/gcrypt/gnutls/v3.8/gnutls-3.8.12.tar.xz

Here are OpenPGP detached signatures signed using keys:
5D46CB0F763405A7053556F47A75A648B3F9220C
and
E987AB7F7E89667776D05B3BB0E9DD20B29F1432
https://www.gnupg.org/ftp/gcrypt/gnutls/v3.8/gnutls-3.8.12.tar.xz.sig

Note that it has been signed with the following openpgp keys:

pub   ed25519 2021-12-23 [SC] [expires: 2027-01-01]
       5D46CB0F763405A7053556F47A75A648B3F9220C
uid           [ultimate] Zoltan Fridrich <zfridric@...hat.com>
sub   cv25519 2021-12-23 [E] [expires: 2027-01-01]

pub   rsa4096 2016-09-27 [SC]
       E987AB7F7E89667776D05B3BB0E9DD20B29F1432
uid           [ultimate] Alexander Sosedkin <monk@...oiled.info>
sub   rsa4096 2021-08-21 [A]
sub   rsa4096 2016-09-27 [E]
sub   rsa4096 2016-09-27 [S]


Regards,
Alexander Sosedkin

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.