rpm package
suse/gnutls&distro=SUSE Linux Enterprise Server 15 SP1-LTSS
pkg:rpm/suse/gnutls&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSS
Vulnerabilities (6)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2023-5981 | — | < 3.6.7-150000.6.50.1 | 3.6.7-150000.6.50.1 | Nov 28, 2023 | A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding. | ||
| CVE-2023-0361 | — | < 3.6.7-150000.6.50.1 | 3.6.7-150000.6.50.1 | Feb 15, 2023 | A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attac | ||
| CVE-2021-4209 | — | < 3.6.7-150000.6.45.2 | 3.6.7-150000.6.45.2 | Aug 24, 2022 | A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances. | ||
| CVE-2022-2509 | — | < 3.6.7-150000.6.45.2 | 3.6.7-150000.6.45.2 | Aug 1, 2022 | A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function. | ||
| CVE-2021-20232 | — | < 3.6.7-6.40.2 | 3.6.7-6.40.2 | Mar 12, 2021 | A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences. | ||
| CVE-2021-20231 | — | < 3.6.7-6.40.2 | 3.6.7-6.40.2 | Mar 12, 2021 | A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences. |
- CVE-2023-5981Nov 28, 2023affected < 3.6.7-150000.6.50.1fixed 3.6.7-150000.6.50.1
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
- CVE-2023-0361Feb 15, 2023affected < 3.6.7-150000.6.50.1fixed 3.6.7-150000.6.50.1
A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attac
- CVE-2021-4209Aug 24, 2022affected < 3.6.7-150000.6.45.2fixed 3.6.7-150000.6.45.2
A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.
- CVE-2022-2509Aug 1, 2022affected < 3.6.7-150000.6.45.2fixed 3.6.7-150000.6.45.2
A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.
- CVE-2021-20232Mar 12, 2021affected < 3.6.7-6.40.2fixed 3.6.7-6.40.2
A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.
- CVE-2021-20231Mar 12, 2021affected < 3.6.7-6.40.2fixed 3.6.7-6.40.2
A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.