VYPR

rpm package

suse/gnutls&distro=SUSE Linux Enterprise Micro 5.5

pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Micro%205.5

Vulnerabilities (12)

  • CVE-2025-14831MedFeb 9, 2026
    affected < 3.7.3-150400.4.56.1fixed 3.7.3-150400.4.56.1

    A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).

  • CVE-2025-9820MedJan 26, 2026
    affected < 3.7.3-150400.4.53.1fixed 3.7.3-150400.4.53.1

    A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error c

  • CVE-2025-6395MedJul 10, 2025
    affected < 3.7.3-150400.4.50.1fixed 3.7.3-150400.4.50.1

    A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().

  • CVE-2025-32990MedJul 10, 2025
    affected < 3.7.3-150400.4.50.1fixed 3.7.3-150400.4.50.1

    A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory

  • CVE-2025-32989MedJul 10, 2025
    affected < 3.7.3-150400.4.50.1fixed 3.7.3-150400.4.50.1

    A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extensi

  • CVE-2025-32988MedJul 10, 2025
    affected < 3.7.3-150400.4.50.1fixed 3.7.3-150400.4.50.1

    A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure()

  • CVE-2024-12243MedFeb 10, 2025
    affected < 3.7.3-150400.4.47.1fixed 3.7.3-150400.4.47.1

    A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to sen

  • CVE-2024-28834MedMar 21, 2024
    affected < 3.7.3-150400.4.44.1fixed 3.7.3-150400.4.44.1

    A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noti

  • CVE-2024-28835MedMar 21, 2024
    affected < 3.7.3-150400.4.44.1fixed 3.7.3-150400.4.44.1

    A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command.

  • CVE-2024-0567Jan 16, 2024
    affected < 3.7.3-150400.4.41.3fixed 3.7.3-150400.4.41.3

    A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to in

  • CVE-2024-0553Jan 16, 2024
    affected < 3.7.3-150400.4.41.3fixed 3.7.3-150400.4.41.3

    A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-

  • CVE-2023-5981Nov 28, 2023
    affected < 3.7.3-150400.4.38.1fixed 3.7.3-150400.4.38.1

    A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.