gnutls vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://ftp.gnutls.org|gnutls package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Information Exposure

[,3.8.4)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[,3.8.4)
  • M
Improper Verification of Cryptographic Signature

[,3.8.3)
  • M
Observable Discrepancy

[,3.8.3)
  • H
Information Exposure Through Discrepancy

[,3.8.2)
  • H
Observable Timing Discrepancy

[,3.8.0)
  • H
Double Free

[0,)
  • M
NULL Pointer Dereference

[,3.7.3)
  • M
Use of a Risky Cryptographic Algorithm

[,3.6.12)
  • M
Improper Input Validation

[,2.12.23]
  • H
Out-of-Bounds

[,1.2.1)
  • H
Cryptographic Issues

[,2.8.2)
  • C
Denial of Service (DoS)

[0,2.0.4-3.fc9)
  • M
Cryptographic Issues

[,3.0.10)
  • M
Cryptographic Issues

[,2.6.6)
  • M
Cryptographic Issues

[,1.4.2)
  • M
Insufficiently Protected Credentials

[,2.6.6)
  • H
Use of a Risky Cryptographic Algorithm

[3.6.0,3.6.14)
  • C
Use After Free

[3.6.3,3.7.1)
  • M
Out-of-Bounds

[,3.1.15)[3.2.0,3.2.5)
  • M
Denial of Service (DoS)

[,3.1.20)[3.2.0,3.2.10)
  • M
Cryptographic Issues

[,2.12.17)
  • H
Out-of-bounds Write

[,3.5.10)
  • H
Out-of-bounds Read

[,3.3.26)
  • M
Cryptographic Issues

[,3.1.28)[3.2.0,3.2.20)[3.3.0,3.3.10)
  • H
Out-of-bounds Write

[,3.6.15)
  • M
Out-of-Bounds

[,3.1.25)
  • M
Cryptographic Issues

[,3.1.21)[3.2.0,3.2.12)
  • M
Denial of Service (DoS)

[,1.0.25)[1.2.0,1.2.3)
  • M
Insufficiently Protected Credentials

[,2.6.1)
  • M
Code

[,2.10.0)
  • C
Out-of-Bounds

[,3.3.26)
  • M
Access Restriction Bypass

[,3.1.20)[3.2.0,3.2.11)
  • H
Cryptographic Issues

[2.5.0,2.6.5]
  • M
Denial of Service (DoS)

[,3.3.17)[3.4.0,3.4.4)
  • M
Out-of-Bounds

[,2.12.14)[3.0.0,3.0.7)
  • M
Denial of Service (DoS)

[,3.1.16)[3.2.0,3.2.6)
  • M
User Enumeration

[,3.6.5)
  • M
Use of a Risky Cryptographic Algorithm

[,3.6.12)
  • H
Improper Authentication

[0,2.0.4-3.fc9)
  • M
Denial of Service (DoS)

[0,2.0.4-3.fc9)
  • H
Denial of Service (DoS)

[,1.0.16]
  • H
NULL Pointer Dereference

[,3.5.13)
  • M
Cryptographic Issues

[,3.0.11)
  • H
Resource Management Errors

[,3.0.14)
  • H
Double Free

[3.5.8,3.6.7)
  • C
Double Free

[,3.3.26)
  • M
Cryptographic Issues

[,2.12.23)[3.0.0,3.0.28)[3.1.0,3.1.7)
  • M
Use After Free

[3.6.3,3.7.1)
  • C
Out-of-Bounds

[,3.3.26)
  • H
Access Restriction Bypass

[,3.4.15)
  • H
Out-of-Bounds

[2.3.5,2.4.0]
  • H
Improper Input Validation

[0,3.4.13)
  • H
Access of Uninitialized Pointer

[3.6.3,3.6.7)
  • H
Denial of Service (DoS)

[,3.3.14)
  • H
Improper Certificate Validation

[,3.3.13)
  • H
Use of a Risky Cryptographic Algorithm

[3.6.3,3.6.13)
  • M
Use of a Risky Cryptographic Algorithm

[,3.6.12)
  • M
User Enumeration

[2.0.0,3.0.0)
  • M
Access Restriction Bypass

[,2.8.0)
  • M
CVE-2006-4790

[,1.4.4)
  • H
Buffer Overflow

[,3.5.7)
  • M
NULL Pointer Dereference

[,3.5.7)
  • M
Denial of Service (DoS)

[,3.5.7)
  • M
Denial of Service (DoS)

[,3.0.17)
  • M
Cryptographic Issues

[,2.6.4)
  • M
Cryptographic Issues

[,2.8.6)