VYPR

rpm package

suse/gnutls&distro=SUSE Linux Enterprise Micro 5.1

pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Vulnerabilities (9)

  • CVE-2025-6395MedJul 10, 2025
    affected < 3.6.7-150200.14.37.1fixed 3.6.7-150200.14.37.1

    A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().

  • CVE-2025-32990MedJul 10, 2025
    affected < 3.6.7-150200.14.37.1fixed 3.6.7-150200.14.37.1

    A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory

  • CVE-2025-32988MedJul 10, 2025
    affected < 3.6.7-150200.14.37.1fixed 3.6.7-150200.14.37.1

    A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure()

  • CVE-2024-12243MedFeb 10, 2025
    affected < 3.6.7-150200.14.34.1fixed 3.6.7-150200.14.34.1

    A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to sen

  • CVE-2024-0553Jan 16, 2024
    affected < 3.6.7-150200.14.31.1fixed 3.6.7-150200.14.31.1

    A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-

  • CVE-2023-5981Nov 28, 2023
    affected < 3.6.7-150200.14.28.1fixed 3.6.7-150200.14.28.1

    A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.

  • CVE-2023-0361Feb 15, 2023
    affected < 3.6.7-150200.14.25.2fixed 3.6.7-150200.14.25.2

    A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attac

  • CVE-2021-4209Aug 24, 2022
    affected < 3.6.7-14.16.1fixed 3.6.7-14.16.1

    A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.

  • CVE-2022-2509Aug 1, 2022
    affected < 3.6.7-150200.14.19.2fixed 3.6.7-150200.14.19.2

    A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.