Search CVE reports
21 – 30 of 55 results
Some fixes available 9 of 13
A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | Not in release | Not in release | Not in release |
gnutls28 | — | Fixed | Fixed | Ignored |
Some fixes available 2 of 3
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | Not in release | Not in release | Not in release | Not in release |
gnutls28 | Not affected | Not affected | Not affected | Fixed |
Some fixes available 2 of 3
It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | Not in release | Not in release | Not in release | Not in release |
gnutls28 | Not affected | Not affected | Not affected | Fixed |
Some fixes available 2 of 3
It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical...
2 affected packages
gnutls28, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls28 | Not affected | Not affected | Not affected | Fixed |
gnutls26 | Not in release | Not in release | Not in release | Not in release |
Some fixes available 4 of 6
GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | Not in release | Not in release |
gnutls28 | — | — | Not affected | Not affected |
GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Fixed |
Some fixes available 9 of 10
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Fixed |
Some fixes available 9 of 10
Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Fixed |
Some fixes available 9 of 10
The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Fixed |
Some fixes available 7 of 8
Double free vulnerability in the gnutls_x509_ext_import_proxy function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via crafted policy language information in an...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Fixed |