Gnu Gnutls vulnerabilities
66 known vulnerabilities affecting gnu/gnutls.
Total CVEs
66
CISA KEV
0
Public exploits
4
Exploited in wild
0
Severity breakdown
CRITICAL7HIGH24MEDIUM35
Vulnerabilities
Page 1 of 4
CVE-2025-32988HIGHCVSS 8.2fixed in 3.8.102025-07-10
CVE-2025-32988 [MEDIUM] CWE-415 CVE-2025-32988: A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership
A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition wh
nvd
CVE-2024-0553HIGHCVSS 7.5fixed in 3.8.32024-01-16
CVE-2024-0553 [HIGH] CVE-2024-0553: A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKe
A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-05
nvd
CVE-2024-0567HIGHCVSS 7.5≥ 3.7.0, < 3.8.32024-01-16
CVE-2024-0567 [HIGH] CWE-347 CVE-2024-0567: A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain
A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.
nvd
CVE-2023-5981MEDIUMCVSS 5.9fixed in 3.8.22023-11-28
CVE-2023-5981 [MEDIUM] CWE-208 CVE-2023-5981: A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExcha
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
nvd
CVE-2023-0361HIGHCVSS 7.4v3.6.8-11.el8_22023-02-15
CVE-2023-0361 [HIGH] CWE-203 CVE-2023-0361: A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. Th
A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the
nvd
CVE-2021-4209MEDIUMCVSS 6.5fixed in 3.7.32022-08-24
CVE-2021-4209 [MEDIUM] CWE-476 CVE-2021-4209: A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally ca
A NULL pointer dereference flaw was found in GnuTLS. As Nettle's hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.
nvd
CVE-2022-2509HIGHCVSS 7.5fixed in 3.7.72022-08-01
CVE-2022-2509 [HIGH] CWE-415 CVE-2022-2509: A vulnerability found in gnutls. This security flaw happens because of a double free error occurs du
A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.
nvd
CVE-2021-20232CRITICALCVSS 9.8≥ 3.6.3, < 3.7.12021-03-12
CVE-2021-20232 [CRITICAL] CWE-416 CVE-2021-20232: A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c
A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.
nvd
CVE-2021-20231CRITICALCVSS 9.8≥ 3.6.3, < 3.7.12021-03-12
CVE-2021-20231 [CRITICAL] CWE-416 CVE-2021-20231: A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to
A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.
nvd
CVE-2020-24659HIGHCVSS 7.5fixed in 3.6.152020-09-04
CVE-2020-24659 [HIGH] CWE-476 CVE-2020-24659: An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in
An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake f
nvd
CVE-2020-13777HIGHCVSS 7.4≥ 3.6.0, < 3.6.142020-06-04
CVE-2020-13777 [HIGH] CWE-327 CVE-2020-13777: GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of co
GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryp
nvd
CVE-2020-11501HIGHCVSS 7.4≥ 3.6.3, < 3.6.132020-04-03
CVE-2020-11501 [HIGH] CWE-330 CVE-2020-11501: GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.
GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.
nvd
CVE-2015-0294HIGHCVSS 7.5fixed in 3.3.132020-01-27
CVE-2015-0294 [HIGH] CWE-295 CVE-2015-0294: GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certific
GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate.
nvd
CVE-2015-8313MEDIUMCVSS 5.9≥ 2.0.0, ≤ 2.12.242019-12-20
CVE-2015-8313 [MEDIUM] CWE-203 CVE-2015-8313: GnuTLS incorrectly validates the first byte of padding in CBC modes
GnuTLS incorrectly validates the first byte of padding in CBC modes
nvd
CVE-2019-3836HIGHCVSS 7.5≥ 3.6.3, < 3.6.72019-04-01
CVE-2019-3836 [MEDIUM] CWE-456 CVE-2019-3836: It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer acc
It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages.
nvd
CVE-2019-3829HIGHCVSS 7.5≥ 3.5.8, < 3.6.72019-03-27
CVE-2019-3829 [MEDIUM] CWE-416 CVE-2019-3829: A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double fr
A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected.
nvd
CVE-2018-16868MEDIUMCVSS 5.6≤ 3.6.42018-12-03
CVE-2018-16868 [MEDIUM] CWE-203 CVE-2018-16868: A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles v
A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
nvd
CVE-2018-10846MEDIUMCVSS 5.6fixed in 3.6.122018-08-22
CVE-2018-10846 [MEDIUM] CWE-385 CVE-2018-10846: A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM at
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
nvd
CVE-2018-10844MEDIUMCVSS 5.9fixed in 3.6.122018-08-22
CVE-2018-10844 [MEDIUM] CWE-385 CVE-2018-10844: It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style
It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.
nvd
CVE-2018-10845MEDIUMCVSS 5.9fixed in 3.6.122018-08-22
CVE-2018-10845 [MEDIUM] CWE-385 CVE-2018-10845: It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style
It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.
nvd
1 / 4Next →