ALT-PU-2014-1264-1
Closed vulnerabilities
BDU:2015-01328
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-07241
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07246
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07249
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07253
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09730
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09761
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-11
CVE-2013-2116
The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS 2.12.23 allows remote attackers to cause a denial of service (buffer over-read and crash) via a crafted padding length. NOTE: this might be due to an incorrect fix for CVE-2013-0169.
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0883.html
- http://secunia.com/advisories/53911
- http://secunia.com/advisories/57260
- http://secunia.com/advisories/57274
- http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/6753
- http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/6754
- http://www.debian.org/security/2013/dsa-2697
- http://www.gnutls.org/security.html#GNUTLS-SA-2013-2
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:171
- http://www.securitytracker.com/id/1028603
- http://www.ubuntu.com/usn/USN-1843-1
- https://gitorious.org/gnutls/gnutls/commit/5164d5a1d57cd0372a5dd074382ca960ca18b27d
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00003.html
- http://rhn.redhat.com/errata/RHSA-2013-0883.html
- http://secunia.com/advisories/53911
- http://secunia.com/advisories/57260
- http://secunia.com/advisories/57274
- http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/6753
- http://thread.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/6754
- http://www.debian.org/security/2013/dsa-2697
- http://www.gnutls.org/security.html#GNUTLS-SA-2013-2
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:171
- http://www.securitytracker.com/id/1028603
- http://www.ubuntu.com/usn/USN-1843-1
- https://gitorious.org/gnutls/gnutls/commit/5164d5a1d57cd0372a5dd074382ca960ca18b27d
Modified: 2025-04-12
CVE-2014-0092
lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
- http://gnutls.org/security.html#GNUTLS-SA-2014-2
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00020.html
- http://rhn.redhat.com/errata/RHSA-2014-0246.html
- http://rhn.redhat.com/errata/RHSA-2014-0247.html
- http://rhn.redhat.com/errata/RHSA-2014-0288.html
- http://rhn.redhat.com/errata/RHSA-2014-0339.html
- http://secunia.com/advisories/56933
- http://secunia.com/advisories/57103
- http://secunia.com/advisories/57204
- http://secunia.com/advisories/57254
- http://secunia.com/advisories/57260
- http://secunia.com/advisories/57274
- http://secunia.com/advisories/57321
- http://www.debian.org/security/2014/dsa-2869
- http://www.securityfocus.com/bid/65919
- http://www.ubuntu.com/usn/USN-2127-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1069865
- http://gnutls.org/security.html#GNUTLS-SA-2014-2
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00020.html
- http://rhn.redhat.com/errata/RHSA-2014-0246.html
- http://rhn.redhat.com/errata/RHSA-2014-0247.html
- http://rhn.redhat.com/errata/RHSA-2014-0288.html
- http://rhn.redhat.com/errata/RHSA-2014-0339.html
- http://secunia.com/advisories/56933
- http://secunia.com/advisories/57103
- http://secunia.com/advisories/57204
- http://secunia.com/advisories/57254
- http://secunia.com/advisories/57260
- http://secunia.com/advisories/57274
- http://secunia.com/advisories/57321
- http://www.debian.org/security/2014/dsa-2869
- http://www.securityfocus.com/bid/65919
- http://www.ubuntu.com/usn/USN-2127-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1069865
Modified: 2025-04-12
CVE-2014-1959
lib/x509/verify.c in GnuTLS before 3.1.21 and 3.2.x before 3.2.11 treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates.
- http://seclists.org/oss-sec/2014/q1/344
- http://seclists.org/oss-sec/2014/q1/345
- http://www.debian.org/security/2014/dsa-2866
- http://www.gnutls.org/security.html
- http://www.securityfocus.com/bid/65559
- http://www.ubuntu.com/usn/USN-2121-1
- https://www.gitorious.org/gnutls/gnutls/commit/b1abfe3d182d68539900092eb42fc62cf1bb7e7c
- http://seclists.org/oss-sec/2014/q1/344
- http://seclists.org/oss-sec/2014/q1/345
- http://www.debian.org/security/2014/dsa-2866
- http://www.gnutls.org/security.html
- http://www.securityfocus.com/bid/65559
- http://www.ubuntu.com/usn/USN-2121-1
- https://www.gitorious.org/gnutls/gnutls/commit/b1abfe3d182d68539900092eb42fc62cf1bb7e7c