FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-27 18:04:16 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
f645aa90-a3e8-11e3-a422-3c970e169bc2gnutls -- multiple certificate verification issues

GnuTLS project reports:

A vulnerability was discovered that affects the certificate verification functions of all gnutls versions. A specially crafted certificate could bypass certificate validation checks. The vulnerability was discovered during an audit of GnuTLS for Red Hat.

Suman Jana reported a vulnerability that affects the certificate verification functions of gnutls 2.11.5 and later versions. A version 1 intermediate certificate will be considered as a CA certificate by default (something that deviates from the documented behavior).


Discovery 2014-03-03
Entry 2014-03-04
Modified 2014-04-30
gnutls
< 2.12.23_4

linux-f10-gnutls
< 2.12.23_4

gnutls-devel
< 3.1.22

gt 3.2.0 lt 3.2.12

gnutls3
< 3.1.22

gt 3.2.0 lt 3.2.12

CVE-2014-0092
CVE-2014-1959
http://www.gnutls.org/security.html#GNUTLS-SA-2014-1
http://www.gnutls.org/security.html#GNUTLS-SA-2014-2
3de36a19-429d-11e5-9daa-14dae9d210b8gnutls -- MD5 downgrade in TLS signatures

Karthikeyan Bhargavan reports:

GnuTLS does not by default support MD5 signatures. Indeed the RSA-MD5 signature-hash algorithm needs to be explicitly enabled using the priority option VERIFY_ALLOW_SIGN_RSA_MD5. In the NORMAL and SECURE profiles, GnuTLS clients do not offer RSA-MD5 in the signature algorithms extension. However, we find that all GnuTLS clients still accept RSA-MD5 in the ServerKeyExchange and GnuTLS servers still accept RSA-MD5 in the ClientCertificateVerify.


Discovery 2015-04-25
Entry 2015-08-14
gnutls
< 3.3.15

http://permalink.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/8132
http://www.gnutls.org/security.html#GNUTLS-SA-2015-2
http://seclists.org/oss-sec/2015/q2/367
ef5b4f5f-a658-11ea-80d7-001cc0382b2fGnuTLS -- flaw in TLS session ticket key construction

The GnuTLS project reports:

It was found that GnuTLS 3.6.4 introduced a regression in the TLS protocol implementation. This caused the TLS server to not securely construct a session ticket encryption key considering the application supplied secret, allowing a MitM attacker to bypass authentication in TLS 1.3 and recover previous conversations in TLS 1.2.


Discovery 2020-06-03
Entry 2020-06-04
gnutls
< 3.6.14

https://gnutls.org/security-new.html#GNUTLS-SA-2020-06-03
CVE-2020-13777
fb30db8f-62af-11e9-b0de-001cc0382b2fGnuTLS -- double free, invalid pointer access

The GnuTLS project reports:

  • Tavis Ormandy from Google Project Zero found a memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected.
  • It was found using the TLS fuzzer tools that decoding a malformed TLS1.3 asynchronous message can cause a server crash via an invalid pointer access. The issue affects GnuTLS server applications since 3.6.4.

Discovery 2019-03-27
Entry 2019-04-19
gnutls
< 3.6.7

https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27
CVE-2019-3829
CVE-2019-3836
a0128291-7690-11e6-95a8-0011d823eebdgnutls -- OCSP validation issue

gnutls.org reports:

Stefan Bühler discovered an issue that affects validation of certificates using OCSP responses, which can falsely report a certificate as valid under certain circumstances.


Discovery 2016-09-08
Entry 2016-09-09
gnutls
< 3.4.15

https://gnutls.org/security.html#GNUTLS-SA-2016-3
ec6a2a1e-429d-11e5-9daa-14dae9d210b8gnutls -- double free in certificate DN decoding

gnutls.org reports:

Kurt Roeckx reported that decoding a specific certificate with very long DistinguishedName (DN) entries leads to double free, which may result to a denial of service. Since the DN decoding occurs in almost all applications using certificates it is recommended to upgrade the latest GnuTLS version fixing the issue. Recommendation: Upgrade to GnuTLS 3.4.4, or 3.3.17.


Discovery 2015-07-20
Entry 2015-08-14
Modified 2015-08-18
gnutls
< 3.3.17

http://www.gnutls.org/security.html#GNUTLS-SA-2015-3
http://seclists.org/oss-sec/2015/q3/308
https://gitlab.com/gnutls/gnutls/commit/272854367efc130fbd4f1a51840d80c630214e12
CVE-2015-6251
b33fb1e0-4c37-11e7-afeb-0011d823eebdGnuTLS -- Denial of service vulnerability

The GnuTLS project reports:

It was found using the TLS fuzzer tools that decoding a status response TLS extension with valid contents could lead to a crash due to a null pointer dereference. The issue affects GnuTLS server applications.


Discovery 2017-06-07
Entry 2017-06-08
gnutls
< 3.5.13

https://gnutls.org/security.html#GNUTLS-SA-2017-4
9733c480-ebff-11e3-970b-206a8a720317gnutls -- client-side memory corruption

GnuTLS project reports:

This vulnerability affects the client side of the gnutls library. A server that sends a specially crafted ServerHello could corrupt the memory of a requesting client.


Discovery 2014-05-14
Entry 2014-06-04
gnutls
< 2.12.23_6

CVE-2014-3466
http://www.gnutls.org/security.html#GNUTLS-SA-2014-3
0c5369fc-d671-11e6-a9a5-b499baebfeafGnuTLS -- Memory corruption vulnerabilities

The GnuTLS project reports:

  • It was found using the OSS-FUZZ fuzzer infrastructure that decoding a specially crafted OpenPGP certificate could lead to heap and stack overflows. (GNUTLS-SA-2017-2)
  • It was found using the OSS-FUZZ fuzzer infrastructure that decoding a specially crafted X.509 certificate with Proxy Certificate Information extension present could lead to a double free. (GNUTLS-SA-2017-1)

Discovery 2017-01-09
Entry 2017-01-09
gnutls
< 3.5.8

http://www.gnutls.org/news.html#2017-01-09
http://www.gnutls.org/security.html#GNUTLS-SA-2017-2
http://www.gnutls.org/security.html#GNUTLS-SA-2017-1
d887b3d9-7366-11ea-b81a-001cc0382b2fGnuTLS -- flaw in DTLS protocol implementation

The GnuTLS project reports:

It was found that GnuTLS 3.6.3 introduced a regression in the DTLS protocol implementation. This caused the DTLS client to not contribute any randomness to the DTLS negotiation breaking the security guarantees of the DTLS protocol.


Discovery 2020-03-31
Entry 2020-03-31
gnutls
< 3.6.13

https://gnutls.org/security-new.html#GNUTLS-SA-2020-03-31
CVE-2020-11501
2272e6f1-f029-11ea-838a-0011d823eebdGnuTLS -- null pointer dereference

The GnuTLS project reports:

It was found by oss-fuzz that the server sending a "no_renegotiation" alert in an unexpected timing, followed by an invalid second handshake can cause a TLS 1.3 client to crash via a null-pointer dereference. The crash happens in the application's error handling path, where the gnutls_deinit function is called after detecting a handshake failure.


Discovery 2020-09-04
Entry 2020-09-06
gnutls
< 3.6.15

https://gnutls.org/security-new.html#GNUTLS-SA-2020-09-04
CVE-2020-24659