Fedora Linux 8776 Published by

A gnutls security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: gnutls-3.7.7-1.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-0156c442d0
2022-07-31 01:30:22.784996
--------------------------------------------------------------------------------

Name : gnutls
Product : Fedora 36
Version : 3.7.7
Release : 1.fc36
URL :   http://www.gnutls.org/
Summary : A TLS protocol implementation
Description :
GnuTLS is a secure communications library implementing the SSL, TLS and DTLS
protocols and technologies around them. It provides a simple C language
application programming interface (API) to access the secure communications
protocols as well as APIs to parse and write X.509, PKCS #12, OpenPGP and
other required structures.

--------------------------------------------------------------------------------
Update Information:

Rebase gnutls to version 3.7.7 notes=Security fix for CVE-2022-2509
--------------------------------------------------------------------------------
ChangeLog:

* Fri Jul 29 2022 Zoltan Fridrich 3.7.7-1
- [packit] 3.7.7 upstream release
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2108977 - CVE-2022-2509 gnutls: Double free during gnutls_pkcs7_verify.
  https://bugzilla.redhat.com/show_bug.cgi?id=2108977
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-0156c442d0' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________