Latest gnu gnutls Vulnerabilities

Gnutls: rejects certificate chain with distributed trust
ubuntu/gnutls28<3.8.3-1
ubuntu/gnutls28<3.7.3-4ubuntu1.4
ubuntu/gnutls28<3.7.8-5ubuntu1.2
ubuntu/gnutls28<3.8.1-4ubuntu1.2
Gnu Gnutls<3.8.3
redhat/GnuTLS<3.8.3
and 1 more
Gnutls: incomplete fix for cve-2023-5981
ubuntu/gnutls28<3.8.3-1
ubuntu/gnutls28<3.6.13-2ubuntu1.10
ubuntu/gnutls28<3.7.3-4ubuntu1.4
ubuntu/gnutls28<3.7.8-5ubuntu1.2
ubuntu/gnutls28<3.8.1-4ubuntu1.2
Gnu Gnutls<3.8.3
and 5 more
Gnutls: timing side-channel in the rsa-psk authentication
redhat/GnuTLS<3.8.2
Gnu Gnutls=1.5.0
Redhat Linux=8.0
Redhat Linux=9.0
Fedoraproject Fedora=37
Fedoraproject Fedora=38
and 7 more
GnuTLS could allow a remote attacker to obtain sensitive information, caused by a timing side-channel flaw in the handling of RSA ClientKeyExchange messages. By recovering the secret from the ClientKe...
redhat/gnutls<0:3.6.16-6.el8_7
redhat/gnutls<0:3.6.16-5.el8_6.1
redhat/gnutls<0:3.7.6-18.el9_1
redhat/gnutls<0:3.7.6-18.el9_0
Gnu Gnutls=3.6.8-11.el8_2
Redhat Enterprise Linux=8.0
and 11 more
A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.
Gnu Gnutls<3.7.7
Redhat Enterprise Linux=8.0
Redhat Enterprise Linux=9.0
Fedoraproject Fedora=35
Debian Debian Linux=10.0
Debian Debian Linux=11.0
and 1 more
A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of ...
redhat/gnutls<3.7.3
Gnu Gnutls<3.7.3
Redhat Enterprise Linux=8.0
Apple iPadOS
IBM Cloud Pak for Business Automation
Netapp Hci Bootstrap Os
and 1 more
GnuTLS is vulnerable to a denial of service, caused by a use-after-free issue in client sending key_share extension. By sending a specially-crafted request, an attacker could exploit this vulnerabilit...
redhat/gnutls<3.7.1
Gnu Gnutls>=3.6.3<3.7.1
Redhat Enterprise Linux=8.0
Fedoraproject Fedora=34
Apple iPadOS
Netapp E-series Performance Analyzer
and 3 more
GnuTLS is vulnerable to a denial of service, caused by a use-after-free issue in client_send_params in lib/ext/pre_shared_key.c. By sending a specially-crafted request, an attacker could exploit this ...
redhat/gnutls<3.7.1
Gnu Gnutls>=3.6.3<3.7.1
Redhat Enterprise Linux=8.0
Fedoraproject Fedora=34
IBM QRadar SIEM<=7.5.0 GA
IBM QRadar SIEM<=7.4.3 GA - 7.4.3 FP4
and 1 more
An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid sec...
Gnu Gnutls<3.6.15
Fedoraproject Fedora=32
Fedoraproject Fedora=33
openSUSE Leap=15.1
openSUSE Leap=15.2
Canonical Ubuntu Linux=20.04
and 9 more
GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is...
Gnu Gnutls>=3.6.0<3.6.14
Fedoraproject Fedora=31
Fedoraproject Fedora=32
Canonical Ubuntu Linux=19.10
Canonical Ubuntu Linux=20.04
Debian Debian Linux=10.0
and 6 more
GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' byt...
debian/gnutls28
ubuntu/gnutls28<3.6.9-5ubuntu1.1
ubuntu/gnutls28<3.6.13-2
Gnu Gnutls>=3.6.3<3.6.13
Canonical Ubuntu Linux=19.10
Debian Debian Linux=10.0
and 3 more
GnuTLS incorrectly validates the first byte of padding in CBC modes
Gnu Gnutls>=2.0.0<=2.12.24
Debian Debian Linux=7.0
Debian Debian Linux=8.0
Debian Debian Linux=9.0
Debian Debian Linux=10.0
debian/gnutls28
It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages.
Gnu Gnutls>=3.6.3<3.6.7
Fedoraproject Fedora=28
openSUSE Leap=15.0
redhat/gnutls<3.6.7
ubuntu/gnutls28<3.6.4-2ubuntu1.2
ubuntu/gnutls28<3.6.5-2ubuntu1.1
and 2 more
A flaw was found in gnutls 3.5.8 or later. A use-after-free in multi-threaded-clients and a double-free vulnerability in single-threaded clients because _gnutls_x509_get_signature does not clear signa...
Gnu Gnutls>=3.5.8<3.6.7
Fedoraproject Fedora
redhat/gnutls<3.6.7
ubuntu/gnutls28<3.5.18-1ubuntu1.1
ubuntu/gnutls28<3.6.4-2ubuntu1.2
ubuntu/gnutls28<3.6.5-2ubuntu1.1
and 2 more
A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same ph...
Gnu Gnutls<=3.6.4
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in ...
Gnu Gnutls<3.6.12
Redhat Enterprise Linux Desktop=7.0
Redhat Enterprise Linux Server=7.0
Redhat Enterprise Linux Workstation=7.0
Canonical Ubuntu Linux=16.04
Canonical Ubuntu Linux=18.04
and 9 more
It was found that GnuTLS implementation of HMAC-SHA-384 was vulnerable to Lucky thirteen style attack due to use of wrong constant appropriate to hash functions that encode the length field.
Gnu Gnutls<3.6.12
Redhat Enterprise Linux Desktop=7.0
Redhat Enterprise Linux Server=7.0
Redhat Enterprise Linux Workstation=7.0
Canonical Ubuntu Linux=16.04
Canonical Ubuntu Linux=18.04
and 9 more
It was found that GnuTLS implementation of HMAC-SHA-256 was vulnerable to Lucky thirteen style attack due to the fact that not enough dummy compression function calls are added to cater for every situ...
Gnu Gnutls<3.6.12
Redhat Enterprise Linux Desktop=7.0
Redhat Enterprise Linux Server=7.0
Redhat Enterprise Linux Workstation=7.0
Canonical Ubuntu Linux=16.04
Canonical Ubuntu Linux=18.04
and 9 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203