Search CVE reports
31 – 40 of 52 results
Some fixes available 6 of 7
The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS 2.12.23 allows remote attackers to cause a denial of service (buffer over-read and crash) via a crafted padding length. NOTE: this might be due to an...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | — |
gnutls28 | — | — | — | — |
Some fixes available 5 of 8
The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC...
3 affected packages
gnutls13, gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
gnutls28 | — | — | — | — |
Double free vulnerability in libgnutls in GnuTLS before 3.0.14 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted certificate list.
3 affected packages
gnutls28, gnutls13, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls28 | — | — | — | — |
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
Some fixes available 11 of 12
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption...
3 affected packages
gnutls13, gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
gnutls28 | — | — | — | — |
The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to...
3 affected packages
gnutls13, gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
gnutls28 | — | — | — | — |
Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to...
2 affected packages
gnutls13, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
Some fixes available 11 of 21
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained...
9 affected packages
gnutls26, icedtea-web, lighttpd, openjdk-6, openjdk-6b18...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | — |
icedtea-web | — | — | — | — |
lighttpd | — | — | — | — |
openjdk-6 | — | — | — | — |
openjdk-6b18 | — | — | — | — |
openjdk-7 | — | — | — | — |
openssl | — | — | — | — |
sun-java5 | — | — | — | — |
sun-java6 | — | — | — | — |
The gnutls_x509_crt_get_serial function in the GnuTLS library before 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows...
4 affected packages
gnutls11, gnutls12, gnutls13, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls11 | — | — | — | — |
gnutls12 | — | — | — | — |
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1...
1 affected package
gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | — |
Some fixes available 25 of 34
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier,...
10 affected packages
apache2, gnutls12, gnutls13, gnutls26, libapache-mod-ssl...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
apache2 | — | — | — | — |
gnutls12 | — | — | — | — |
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
libapache-mod-ssl | — | — | — | — |
nss | — | — | — | — |
openjdk-6 | — | — | — | — |
openjdk-6b18 | — | — | — | — |
openssl | — | — | — | — |
sun-java6 | — | — | — | — |