Search CVE reports
31 – 40 of 55 results
Some fixes available 7 of 8
Double free vulnerability in the gnutls_x509_ext_import_proxy function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via crafted policy language information in an...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Fixed |
Some fixes available 13 of 15
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw...
4 affected packages
gnutls28, openssl098, gnutls26, openssl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls28 | — | — | — | Not affected |
openssl098 | — | — | — | Not in release |
gnutls26 | — | — | — | Not in release |
openssl | — | — | — | Fixed |
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Not affected |
Some fixes available 23 of 25
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain...
8 affected packages
gnutls26, gnutls28, nss, openjdk-6, openjdk-7...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Not affected |
nss | — | — | — | Fixed |
openjdk-6 | — | — | — | Not in release |
openjdk-7 | — | — | — | Not in release |
openjdk-8 | — | — | — | Not affected |
openssl | — | — | — | Fixed |
openssl098 | — | — | — | Not in release |
Some fixes available 38 of 44
Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol...
12 affected packages
firefox, gnutls26, gnutls28, mbedtls, nss...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
firefox | — | — | — | Fixed |
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Not affected |
mbedtls | — | — | — | Not affected |
nss | — | — | — | Not affected |
openjdk-6 | — | — | — | Not in release |
openjdk-7 | — | — | — | Not in release |
openjdk-8 | — | — | — | Not affected |
openssl | — | — | — | Not affected |
openssl098 | — | — | — | Not in release |
polarssl | — | — | — | Not in release |
thunderbird | — | — | — | Fixed |
GnuTLS incorrectly validates the first byte of padding in CBC modes
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | — |
gnutls28 | — | — | — | — |
Double free vulnerability in GnuTLS before 3.3.17 and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service via a long DistinguishedName (DN) entry in a certificate.
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | Not in release |
gnutls28 | — | — | — | Fixed |
Some fixes available 48 of 55
The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks...
11 affected packages
gnutls26, apache2, firefox, gnutls28, nss...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | Not in release |
apache2 | — | — | — | Not affected |
firefox | — | — | — | Fixed |
gnutls28 | — | — | — | Not affected |
nss | — | — | — | Fixed |
openjdk-6 | — | — | — | Not in release |
openjdk-7 | — | — | — | Not in release |
openjdk-8 | — | — | — | Not affected |
openssl | — | — | — | Not affected |
openssl098 | — | — | — | Not in release |
thunderbird | — | — | — | Fixed |
Double free vulnerability in lib/x509/x509_ext.c in GnuTLS before 3.3.14 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted CRL distribution point.
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | — |
gnutls28 | — | — | — | — |
Some fixes available 3 of 5
GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors.
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls26 | — | — | — | — |
gnutls28 | — | — | — | — |