VYPR

rpm package

suse/gnutls&distro=SUSE Linux Enterprise High Performance Computing 15-ESPOS

pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOS

Vulnerabilities (7)

  • CVE-2021-4209Aug 24, 2022
    affected < 3.6.7-150000.6.45.2fixed 3.6.7-150000.6.45.2

    A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.

  • CVE-2022-2509Aug 1, 2022
    affected < 3.6.7-150000.6.45.2fixed 3.6.7-150000.6.45.2

    A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.

  • CVE-2021-20232Mar 12, 2021
    affected < 3.6.7-6.40.2fixed 3.6.7-6.40.2

    A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.

  • CVE-2021-20231Mar 12, 2021
    affected < 3.6.7-6.40.2fixed 3.6.7-6.40.2

    A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.

  • CVE-2020-24659Sep 4, 2020
    affected < 3.6.7-6.34.1fixed 3.6.7-6.34.1

    An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path

  • CVE-2020-13777Jun 4, 2020
    affected < 3.6.7-6.29.1fixed 3.6.7-6.29.1

    GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first

  • CVE-2020-11501Apr 3, 2020
    affected < 3.6.7-6.14.1fixed 3.6.7-6.14.1

    GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negot