Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-15523

Опубликовано: 30 дек. 2020
Источник: ubuntu
Приоритет: low
CVSS2: 5
CVSS3: 5.3

Описание

An issue was discovered in LINBIT csync2 through 2.0. It does not correctly check for the return value GNUTLS_E_WARNING_ALERT_RECEIVED of the gnutls_handshake() function. It neglects to call this function again, as required by the design of the API.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/jammy

not-affected

esm-apps/noble

not-affected

esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needed
groovy

not-affected

2.0-25-gc0faaf9-1

Показывать по

5 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
около 5 лет назад

An issue was discovered in LINBIT csync2 through 2.0. It does not correctly check for the return value GNUTLS_E_WARNING_ALERT_RECEIVED of the gnutls_handshake() function. It neglects to call this function again, as required by the design of the API.

CVSS3: 5.3
debian
около 5 лет назад

An issue was discovered in LINBIT csync2 through 2.0. It does not corr ...

github
больше 3 лет назад

An issue was discovered in LINBIT csync2 through 2.0. It does not correctly check for the return value GNUTLS_E_WARNING_ALERT_RECEIVED of the gnutls_handshake() function. It neglects to call this function again, as required by the design of the API.

suse-cvrf
больше 4 лет назад

Security update for csync2

suse-cvrf
больше 4 лет назад

Security update for csync2

5 Medium

CVSS2

5.3 Medium

CVSS3