First published: Fri Dec 20 2019(Updated: )
GnuTLS incorrectly validates the first byte of padding in CBC modes
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU GnuTLS | >=2.0.0<=2.12.24 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/gnutls28 | 3.7.1-5+deb11u5 3.7.1-5+deb11u3 3.7.9-2+deb12u3 3.8.6-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this GnuTLS vulnerability is CVE-2015-8313.
The severity of CVE-2015-8313 is medium with a severity value of 5.9.
The software affected by CVE-2015-8313 includes GnuTLS versions 2.0.0 to 2.12.24, Debian Debian Linux versions 7.0 to 10.0, and the package gnutls28 with specific versions 3.6.7-4+deb10u8, 3.6.7-4+deb10u10, 3.7.1-5+deb11u3, 3.7.9-2, and 3.8.1-4.
CVE-2015-8313 affects GnuTLS by incorrectly validating the first byte of padding in CBC modes.
The Common Weakness Enumeration (CWE) ID for CVE-2015-8313 is 203.