Search CVE reports
31 – 40 of 52 results
Buffer overflow in the dane_query_tlsa function in the DANE library (libdane) in GnuTLS 3.1.x before 3.1.15 and 3.2.x before 3.2.5 allows remote servers to cause a denial of service (memory corruption) via a response with more...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | — |
gnutls28 | — | — | — | — |
The NIST SP 800-90A default statement of the Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) algorithm contains point Q constants with a possible relationship to certain "skeleton key" values, which might...
10 affected packages
openssl, mbedtls, openssl098, bouncycastle, gnutls26...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
openssl | — | — | — | Not affected |
mbedtls | — | — | — | Not affected |
openssl098 | — | — | — | Not in release |
bouncycastle | — | — | — | Not affected |
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Not affected |
libgcrypt11 | — | — | — | Not in release |
nss | — | — | — | Not affected |
polarssl | — | — | — | Not in release |
python-crypto | — | — | — | Not affected |
Some fixes available 6 of 7
The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS 2.12.23 allows remote attackers to cause a denial of service (buffer over-read and crash) via a crafted padding length. NOTE: this might be due to an...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | — |
gnutls28 | — | — | — | — |
Some fixes available 5 of 8
The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC...
3 affected packages
gnutls13, gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
gnutls28 | — | — | — | — |
Some fixes available 11 of 12
gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption...
3 affected packages
gnutls13, gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
gnutls28 | — | — | — | — |
Double free vulnerability in libgnutls in GnuTLS before 3.0.14 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted certificate list.
3 affected packages
gnutls28, gnutls13, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls28 | — | — | — | — |
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to...
3 affected packages
gnutls13, gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
gnutls28 | — | — | — | — |
Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to...
2 affected packages
gnutls13, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
Some fixes available 11 of 21
The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained...
9 affected packages
gnutls26, icedtea-web, lighttpd, openjdk-6, openjdk-6b18...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | — |
icedtea-web | — | — | — | — |
lighttpd | — | — | — | — |
openjdk-6 | — | — | — | — |
openjdk-6b18 | — | — | — | — |
openjdk-7 | — | — | — | — |
openssl | — | — | — | — |
sun-java5 | — | — | — | — |
sun-java6 | — | — | — | — |
The _gnutls_x509_oid2mac_algorithm function in lib/gnutls_algorithms.c in GnuTLS before 1.4.2 allows remote attackers to cause a denial of service (crash) via a crafted X.509 certificate that uses a hash algorithm that is not...
4 affected packages
gnutls11, gnutls12, gnutls13, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls11 | — | — | — | — |
gnutls12 | — | — | — | — |
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |