Search CVE reports
41 – 50 of 71 results
The "GNUTLS_KEYLOGFILE" environment variable in gnutls 3.4.12 allows remote attackers to overwrite and corrupt arbitrary files in the filesystem.
1 affected package
gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls28 | — | — | — | — | — |
GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.
2 affected packages
gnutls26, gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls26 | — | — | — | — | Not in release |
| gnutls28 | — | — | — | — | Fixed |
Some fixes available 4 of 6
GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's...
2 affected packages
gnutls26, gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls26 | — | — | — | Not in release | Not in release |
| gnutls28 | — | — | — | Not affected | Not affected |
Some fixes available 9 of 10
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
2 affected packages
gnutls26, gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls26 | — | — | — | — | Not in release |
| gnutls28 | — | — | — | — | Fixed |
Some fixes available 9 of 10
Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
2 affected packages
gnutls26, gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls26 | — | — | — | — | Not in release |
| gnutls28 | — | — | — | — | Fixed |
Some fixes available 9 of 10
The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.
2 affected packages
gnutls26, gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls26 | — | — | — | — | Not in release |
| gnutls28 | — | — | — | — | Fixed |
Some fixes available 7 of 8
Double free vulnerability in the gnutls_x509_ext_import_proxy function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via crafted policy language information in an...
2 affected packages
gnutls26, gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls26 | — | — | — | — | Not in release |
| gnutls28 | — | — | — | — | Fixed |
Some fixes available 13 of 15
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw...
4 affected packages
gnutls28, openssl098, gnutls26, openssl
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls28 | — | — | — | — | Not affected |
| openssl098 | — | — | — | — | Not in release |
| gnutls26 | — | — | — | — | Not in release |
| openssl | — | — | — | — | Fixed |
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate...
2 affected packages
gnutls26, gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls26 | — | — | — | — | Not in release |
| gnutls28 | — | — | — | — | Not affected |
Some fixes available 23 of 25
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain...
8 affected packages
gnutls26, gnutls28, nss, openjdk-6, openjdk-7...
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls26 | — | — | — | — | Not in release |
| gnutls28 | — | — | — | — | Not affected |
| nss | — | — | — | — | Fixed |
| openjdk-6 | — | — | — | — | Not in release |
| openjdk-7 | — | — | — | — | Not in release |
| openjdk-8 | — | — | — | — | Not affected |
| openssl | — | — | — | — | Fixed |
| openssl098 | — | — | — | — | Not in release |