gnutls-dane vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the gnutls-dane package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • M
Uncaught Exception

*
  • M
Improper Protection Against Physical Side Channels

*
  • M
Improper Verification of Cryptographic Signature

*
  • M
Improper Protection Against Physical Side Channels

*
  • M
Improper Protection Against Physical Side Channels

*
  • M
Double Free

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
NULL Pointer Dereference

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Resource Exhaustion

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Heap-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Stack-based Buffer Overflow

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Use After Free

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Improper Certificate Validation

<0:3.3.26-9.el7
  • M
Resource Exhaustion

*
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Improper Data Handling

<0:3.3.8-14.el7_2
  • M
Use of a Broken or Risky Cryptographic Algorithm

*
  • H
Not Failing Securely ('Failing Open')

*
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • M
Integer Overflow or Wraparound

<0:3.1.18-10.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
Improper Handling of Length Parameter Inconsistency

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • H
NULL Pointer Dereference

<0:3.1.18-9.el7_0
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Out-of-bounds Write

<0:3.3.26-9.el7
  • M
Use After Free

*
  • M
Use After Free

*
  • L
Improper Certificate Validation

*
  • M
Information Exposure

*
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.3.29-8.el7