Search CVE reports
31 – 40 of 55 results
Some fixes available 13 of 15
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw...
4 affected packages
gnutls28, openssl098, gnutls26, openssl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls28 | — | — | — | Not affected |
openssl098 | — | — | — | Not in release |
gnutls26 | — | — | — | Not in release |
openssl | — | — | — | Fixed |
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Not affected |
The "GNUTLS_KEYLOGFILE" environment variable in gnutls 3.4.12 allows remote attackers to overwrite and corrupt arbitrary files in the filesystem.
1 affected package
gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls28 | — | — | — | — |
Some fixes available 23 of 25
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain...
8 affected packages
gnutls26, gnutls28, nss, openjdk-6, openjdk-7...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Not affected |
nss | — | — | — | Fixed |
openjdk-6 | — | — | — | Not in release |
openjdk-7 | — | — | — | Not in release |
openjdk-8 | — | — | — | Not affected |
openssl | — | — | — | Fixed |
openssl098 | — | — | — | Not in release |
GnuTLS incorrectly validates the first byte of padding in CBC modes
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | — |
gnutls28 | — | — | — | — |
Some fixes available 38 of 44
Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol...
12 affected packages
firefox, gnutls26, gnutls28, mbedtls, nss...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | — | — | — | Fixed |
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Not affected |
mbedtls | — | — | — | Not affected |
nss | — | — | — | Not affected |
openjdk-6 | — | — | — | Not in release |
openjdk-7 | — | — | — | Not in release |
openjdk-8 | — | — | — | Not affected |
openssl | — | — | — | Not affected |
openssl098 | — | — | — | Not in release |
polarssl | — | — | — | Not in release |
thunderbird | — | — | — | Fixed |
Double free vulnerability in GnuTLS before 3.3.17 and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service via a long DistinguishedName (DN) entry in a certificate.
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Fixed |
Some fixes available 48 of 55
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks...
11 affected packages
apache2, firefox, gnutls26, gnutls28, nss...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
apache2 | — | — | — | Not affected |
firefox | — | — | — | Fixed |
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Not affected |
nss | — | — | — | Fixed |
openjdk-6 | — | — | — | Not in release |
openjdk-7 | — | — | — | Not in release |
openjdk-8 | — | — | — | Not affected |
openssl | — | — | — | Not affected |
openssl098 | — | — | — | Not in release |
thunderbird | — | — | — | Fixed |
Double free vulnerability in lib/x509/x509_ext.c in GnuTLS before 3.3.14 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted CRL distribution point.
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | — |
gnutls28 | — | — | — | — |
Some fixes available 13 of 15
GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Fixed |