rpm package
suse/gnutls&distro=SUSE Enterprise Storage 7.1
pkg:rpm/suse/gnutls&distro=SUSE%20Enterprise%20Storage%207.1
Vulnerabilities (5)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-6395 | Med | 6.5 | < 3.6.7-150200.14.37.1 | 3.6.7-150200.14.37.1 | Jul 10, 2025 | A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite(). | |
| CVE-2025-32990 | Med | 6.5 | < 3.6.7-150200.14.37.1 | 3.6.7-150200.14.37.1 | Jul 10, 2025 | A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory | |
| CVE-2025-32988 | Med | 6.5 | < 3.6.7-150200.14.37.1 | 3.6.7-150200.14.37.1 | Jul 10, 2025 | A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() | |
| CVE-2024-0553 | — | < 3.6.7-150200.14.31.1 | 3.6.7-150200.14.31.1 | Jan 16, 2024 | A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA- | ||
| CVE-2023-5981 | — | < 3.6.7-150200.14.28.1 | 3.6.7-150200.14.28.1 | Nov 28, 2023 | A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding. |
- affected < 3.6.7-150200.14.37.1fixed 3.6.7-150200.14.37.1
A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().
- affected < 3.6.7-150200.14.37.1fixed 3.6.7-150200.14.37.1
A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory
- affected < 3.6.7-150200.14.37.1fixed 3.6.7-150200.14.37.1
A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure()
- CVE-2024-0553Jan 16, 2024affected < 3.6.7-150200.14.31.1fixed 3.6.7-150200.14.31.1
A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-
- CVE-2023-5981Nov 28, 2023affected < 3.6.7-150200.14.28.1fixed 3.6.7-150200.14.28.1
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.