Search CVE reports
341 – 350 of 357 results
gnutls-cli in GnuTLS before 2.6.6 does not verify the activation and expiration times of X.509 certificates, which allows remote attackers to successfully present a certificate that is (1) not yet valid or (2) no longer valid,...
4 affected packages
gnutls11, gnutls12, gnutls13, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls11 | — | — | — | — |
gnutls12 | — | — | — | — |
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
lib/gnutls_pk.c in libgnutls in GnuTLS 2.5.0 through 2.6.5 generates RSA keys stored in DSA structures, instead of the intended DSA keys, which might allow remote attackers to spoof signatures on certificates or have unspecified...
4 affected packages
gnutls11, gnutls12, gnutls13, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls11 | — | — | — | — |
gnutls12 | — | — | — | — |
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via...
4 affected packages
gnutls11, gnutls12, gnutls13, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls11 | — | — | — | — |
gnutls12 | — | — | — | — |
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
Some fixes available 4 of 5
The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows...
4 affected packages
gnutls11, gnutls12, gnutls13, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls11 | — | — | — | — |
gnutls12 | — | — | — | — |
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly...
3 affected packages
gnutls12, gnutls13, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls12 | — | — | — | — |
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
Format string vulnerability in c++filt in Apple Mac OS X 10.5 before 10.5.4 allows user-assisted attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string in (1) C++ or (2) Java source code.
1 affected package
binutils
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
binutils | — | — | — | — |
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain...
3 affected packages
gnutls12, gnutls13, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls12 | — | — | — | — |
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows...
3 affected packages
gnutls12, gnutls13, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls12 | — | — | — | — |
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension...
3 affected packages
gnutls12, gnutls13, gnutls26
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gnutls12 | — | — | — | — |
gnutls13 | — | — | — | — |
gnutls26 | — | — | — | — |
Buffer overflow in the bufprint function in capiutil.c in libcapi, as used in Linux kernel 2.6.9 to 2.6.20 and isdn4k-utils, allows local users to cause a denial of service (crash) and possibly gain privileges via a crafted CAPI packet.
1 affected package
isdnutils
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
isdnutils | — | — | — | — |