gnutls vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the gnutls package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
NULL Pointer Dereference

<0:3.7.6-21.el9_2.4
  • M
Heap-based Buffer Overflow

<0:3.7.6-21.el9_2.4
  • M
Improper Certificate Validation

<0:3.7.6-21.el9_2.4
  • M
Double Free

<0:3.7.6-21.el9_2.4
  • M
Algorithmic Complexity

<0:3.7.6-21.el9_2.4
  • M
NULL Pointer Dereference

<0:3.8.3-4.el9_4.4
  • M
Heap-based Buffer Overflow

<0:3.8.3-4.el9_4.4
  • M
Improper Certificate Validation

<0:3.8.3-4.el9_4.4
  • M
Double Free

<0:3.8.3-4.el9_4.4
  • M
NULL Pointer Dereference

<0:3.8.3-4.el9_4.4
  • M
Heap-based Buffer Overflow

<0:3.8.3-4.el9_4.4
  • M
Improper Certificate Validation

<0:3.8.3-4.el9_4.4
  • M
Double Free

<0:3.8.3-4.el9_4.4
  • M
NULL Pointer Dereference

<0:3.8.3-4.el9_4.4
  • M
Heap-based Buffer Overflow

<0:3.8.3-4.el9_4.4
  • M
Improper Certificate Validation

<0:3.8.3-4.el9_4.4
  • M
Double Free

<0:3.8.3-4.el9_4.4
  • M
Algorithmic Complexity

<0:3.8.3-6.el9
  • M
Algorithmic Complexity

<0:3.8.3-6.el9
  • M
Algorithmic Complexity

<0:3.8.3-6.el9
  • M
Algorithmic Complexity

<0:3.8.3-6.el9
  • M
NULL Pointer Dereference

<0:3.8.3-6.el9_6.2
  • M
Heap-based Buffer Overflow

<0:3.8.3-6.el9_6.2
  • M
Improper Certificate Validation

<0:3.8.3-6.el9_6.2
  • M
Double Free

<0:3.8.3-6.el9_6.2
  • M
NULL Pointer Dereference

<0:3.8.3-6.el9_6.2
  • M
Heap-based Buffer Overflow

<0:3.8.3-6.el9_6.2
  • M
Improper Certificate Validation

<0:3.8.3-6.el9_6.2
  • M
Double Free

<0:3.8.3-6.el9_6.2
  • M
NULL Pointer Dereference

<0:3.8.3-6.el9_6.2
  • M
Heap-based Buffer Overflow

<0:3.8.3-6.el9_6.2
  • M
Improper Certificate Validation

<0:3.8.3-6.el9_6.2
  • M
Double Free

<0:3.8.3-6.el9_6.2
  • M
NULL Pointer Dereference

<0:3.8.3-6.el9_6.2
  • M
Heap-based Buffer Overflow

<0:3.8.3-6.el9_6.2
  • M
Improper Certificate Validation

<0:3.8.3-6.el9_6.2
  • M
Double Free

<0:3.8.3-6.el9_6.2
  • M
NULL Pointer Dereference

<0:3.8.3-6.el9_6.2
  • M
Heap-based Buffer Overflow

<0:3.8.3-6.el9_6.2
  • M
Improper Certificate Validation

<0:3.8.3-6.el9_6.2
  • M
Double Free

<0:3.8.3-6.el9_6.2
  • M
Improper Verification of Cryptographic Signature

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Verification of Cryptographic Signature

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Verification of Cryptographic Signature

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Verification of Cryptographic Signature

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Verification of Cryptographic Signature

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Verification of Cryptographic Signature

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Verification of Cryptographic Signature

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-18.el9_1
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-18.el9_1
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-18.el9_1
  • M
Double Free

<0:3.7.6-12.el9_0
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-18.el9_1
  • M
Double Free

<0:3.7.6-12.el9_0
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-18.el9_1
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-18.el9_1
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-18.el9_1
  • M
Double Free

<0:3.7.6-12.el9_0
  • M
Double Free

<0:3.7.6-12.el9_0
  • M
Double Free

<0:3.7.6-12.el9_0
  • M
Double Free

<0:3.7.6-12.el9_0
  • M
Double Free

<0:3.7.6-12.el9_0
  • M
Uncaught Exception

<0:3.8.3-4.el9_4
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.8.3-4.el9_4
  • M
Uncaught Exception

<0:3.8.3-4.el9_4
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.8.3-4.el9_4
  • M
Uncaught Exception

<0:3.8.3-4.el9_4
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.8.3-4.el9_4
  • M
Uncaught Exception

<0:3.8.3-4.el9_4
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.8.3-4.el9_4
  • M
NULL Pointer Dereference

<0:3.8.3-6.el9_6.2
  • M
Double Free

<0:3.8.3-6.el9_6.2
  • M
Heap-based Buffer Overflow

<0:3.8.3-6.el9_6.2
  • M
Improper Certificate Validation

<0:3.8.3-6.el9_6.2
  • M
Uncaught Exception

<0:3.8.3-4.el9_4
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.8.3-4.el9_4
  • M
Uncaught Exception

<0:3.8.3-4.el9_4
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.8.3-4.el9_4
  • M
Uncaught Exception

<0:3.8.3-4.el9_4
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.8.3-4.el9_4
  • M
Algorithmic Complexity

<0:3.8.3-4.el9_4.2
  • M
Algorithmic Complexity

<0:3.8.3-4.el9_4.2
  • M
Algorithmic Complexity

<0:3.8.3-4.el9_4.2
  • M
Algorithmic Complexity

<0:3.8.3-6.el9
  • M
Algorithmic Complexity

<0:3.8.3-6.el9
  • M
Uncaught Exception

<0:3.8.3-4.el9_4
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.8.3-4.el9_4
  • M
Improper Verification of Cryptographic Signature

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-18.el9_1
  • M
Double Free

<0:3.7.6-12.el9_0
  • M
Uncaught Exception

<0:3.7.6-21.el9_2.3
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.7.6-21.el9_2.3
  • M
Uncaught Exception

<0:3.7.6-21.el9_2.3
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.7.6-21.el9_2.3
  • M
Uncaught Exception

<0:3.7.6-21.el9_2.3
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.7.6-21.el9_2.3
  • M
Uncaught Exception

<0:3.8.3-4.el9_4
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:3.8.3-4.el9_4
  • M
Improper Verification of Cryptographic Signature

<0:3.7.6-21.el9_2.2
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-21.el9_2.2
  • M
Improper Verification of Cryptographic Signature

<0:3.7.6-21.el9_2.2
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-21.el9_2.2
  • M
Improper Verification of Cryptographic Signature

<0:3.7.6-21.el9_2.2
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-21.el9_2.2
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-21.el9_2.1
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-21.el9_2.1
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-21.el9_2.1
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Verification of Cryptographic Signature

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-23.el9_3.3
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-18.el9_1
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-18.el9_1
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-18.el9_1
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-18.el9_0
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-18.el9_1
  • M
Improper Protection Against Physical Side Channels

<0:3.7.6-18.el9_0
  • M
Double Free

<0:3.7.6-12.el9_0
  • M
Double Free

<0:3.7.6-12.el9_0
  • M
Double Free

<0:3.7.6-12.el9_0
  • M
Double Free

<0:3.7.6-12.el9_0
  • M
Double Free

<0:3.7.6-12.el9_0
  • M
Double Free

<0:3.7.6-12.el9_0