Search CVE reports
1 – 10 of 71 results
A flaw was found in gnutls. This vulnerability occurs because permitted name constraints were incorrectly ignored when previous Certificate Authorities (CAs) only had excluded name constraints. A remote attacker could exploit this...
1 affected package
gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls28 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
A flaw was found in gnutls. Servers configured with RSA-PSK (Rivest–Shamir–Adleman – Pre-Shared Key) wrongfully matched usernames containing a NUL character with truncated usernames. A remote attacker could exploit this by sending...
1 affected package
gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls28 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
A heap buffer overflow vulnerability exists in the DTLS handshake fragment reassembly logic of GnuTLS. The issue arises in merge_handshake_packet() where incoming handshake fragments are matched and merged based solely...
1 affected package
gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls28 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
A flaw was found in gnutls. A remote attacker could exploit this vulnerability by presenting a specially crafted Online Certificate Status Protocol (OCSP) response during a TLS handshake. Due to a logic error in how gnutls...
1 affected package
gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls28 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
The PKCS#7 padding check performed during decryption was not constant-time, potentially leaking information about the padding bytes through timing differences.
1 affected package
gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls28 | Needs evaluation | Needs evaluation | Not affected | Not affected | Not affected |
For a server using an RSA key backed by a PKCS#11 token, a client sending an extremely short premaster secret during an RSA key exchange could trigger a short heap overread.
1 affected package
gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls28 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
Appending to a PKCS#12 bag that already contained 32 elements could write past the bag's internal array.
1 affected package
gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls28 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
Changing the Security Officer PIN with gnutls_pkcs11_token_set_pin() with oldpin == NULL for a token lacking a protected authentication path led to a use-after-free.
1 affected package
gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls28 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
Validation of certificates with oversized Subject Alternative Names would fall back to checking DNS hostnames against Common Name.
1 affected package
gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls28 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
Certificates containing URI or SRV Subject Alternative Names would fall back to checking DNS hostnames against Common Name, allowing potential misuse of such certificates beyond their original purpose.
1 affected package
gnutls28
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| gnutls28 | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |