Search CVE reports
21 – 30 of 51 results
CVE-2016-4456
Medium priorityThe “GNUTLS_KEYLOGFILE” environment variable in gnutls 3.4.12 allows remote attackers to overwrite and corrupt arbitrary files in the filesystem.
1 affected package
gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
gnutls28 | — | — | — | — | Not affected |
CVE-2017-7507
Medium priorityGnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
gnutls26 | — | — | — | Not in release | Not in release |
gnutls28 | — | — | — | Fixed | Fixed |
CVE-2017-7869
Low prioritySome fixes available 4 of 6
GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor’s...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
gnutls26 | — | — | Not in release | Not in release | Not in release |
gnutls28 | — | — | Not affected | Not affected | Fixed |
CVE-2017-5337
Medium prioritySome fixes available 9 of 10
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
gnutls26 | — | — | — | Not in release | Not in release |
gnutls28 | — | — | — | Fixed | Fixed |
CVE-2017-5336
Medium prioritySome fixes available 9 of 10
Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
gnutls26 | — | — | — | Not in release | Not in release |
gnutls28 | — | — | — | Fixed | Fixed |
CVE-2017-5335
Medium prioritySome fixes available 9 of 10
The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
gnutls26 | — | — | — | Not in release | Not in release |
gnutls28 | — | — | — | Fixed | Fixed |
CVE-2017-5334
Medium prioritySome fixes available 7 of 8
Double free vulnerability in the gnutls_x509_ext_import_proxy function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via crafted policy language information in an...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
gnutls26 | — | — | — | Not in release | Not in release |
gnutls28 | — | — | — | Fixed | Fixed |
CVE-2016-8610
Low prioritySome fixes available 13 of 15
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw...
4 affected packages
gnutls26, gnutls28, openssl, openssl098
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
gnutls26 | — | — | — | Not in release | Not in release |
gnutls28 | — | — | — | Not affected | Fixed |
openssl | — | — | — | Fixed | Fixed |
openssl098 | — | — | — | Not in release | Not in release |
CVE-2016-7444
Low priorityThe gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate...
2 affected packages
gnutls26, gnutls28
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
gnutls26 | — | — | — | Not in release | Not in release |
gnutls28 | — | — | — | Not affected | Fixed |
CVE-2016-2183
Low prioritySome fixes available 23 of 25
The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain...
8 affected packages
gnutls26, gnutls28, nss, openjdk-6, openjdk-7...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
gnutls26 | — | — | — | Not in release | Not in release |
gnutls28 | — | — | — | Not affected | Not affected |
nss | — | — | — | Fixed | Fixed |
openjdk-6 | — | — | — | Not in release | Not in release |
openjdk-7 | — | — | — | Not in release | Not in release |
openjdk-8 | — | — | — | Not affected | Fixed |
openssl | — | — | — | Fixed | Fixed |
openssl098 | — | — | — | Not in release | Not in release |