Количество 20
Количество 20
RLSA-2026:4188
Moderate: gnutls security update
RLSA-2026:3477
Moderate: gnutls security update
ELSA-2026-5585
ELSA-2026-5585: gnutls security update (MODERATE)
ELSA-2026-50149
ELSA-2026-50149: gnutls security update (MODERATE)
ELSA-2026-4188
ELSA-2026-4188: gnutls security update (MODERATE)
ELSA-2026-3477
ELSA-2026-3477: gnutls security update (MODERATE)
CVE-2025-14831
A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).
CVE-2025-14831
A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).
CVE-2025-14831
A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).
CVE-2025-14831
A flaw was found in GnuTLS. This vulnerability allows a denial of serv ...
CVE-2025-9820
A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.
CVE-2025-9820
A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.
CVE-2025-9820
A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.
CVE-2025-9820
A flaw was found in the GnuTLS library, specifically in the gnutls_pkc ...
SUSE-SU-2026:0829-1
Security update for gnutls
GHSA-pm8w-jq9r-x5rp
A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).
SUSE-SU-2025:4346-1
Security update for gnutls
SUSE-SU-2025:4323-1
Security update for gnutls
GHSA-337w-h8w7-m899
A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.
BDU:2025-15388
Уязвимость функции gnutls_pkcs11_token_init() (lib/pkcs11_write.c) библиотеки GnuTLS, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2026:4188 Moderate: gnutls security update | 20 дней назад | |||
RLSA-2026:3477 Moderate: gnutls security update | 26 дней назад | |||
ELSA-2026-5585 ELSA-2026-5585: gnutls security update (MODERATE) | 8 дней назад | |||
ELSA-2026-50149 ELSA-2026-50149: gnutls security update (MODERATE) | 20 дней назад | |||
ELSA-2026-4188 ELSA-2026-4188: gnutls security update (MODERATE) | 21 день назад | |||
ELSA-2026-3477 ELSA-2026-3477: gnutls security update (MODERATE) | 30 дней назад | |||
CVE-2025-14831 A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs). | CVSS3: 5.3 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-14831 A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs). | CVSS3: 5.3 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-14831 A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs). | CVSS3: 5.3 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-14831 A flaw was found in GnuTLS. This vulnerability allows a denial of serv ... | CVSS3: 5.3 | 0% Низкий | около 2 месяцев назад | |
CVE-2025-9820 A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks. | CVSS3: 4 | 0% Низкий | 2 месяца назад | |
CVE-2025-9820 A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks. | CVSS3: 4 | 0% Низкий | 4 месяца назад | |
CVE-2025-9820 A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks. | CVSS3: 4 | 0% Низкий | 2 месяца назад | |
CVE-2025-9820 A flaw was found in the GnuTLS library, specifically in the gnutls_pkc ... | CVSS3: 4 | 0% Низкий | 2 месяца назад | |
SUSE-SU-2026:0829-1 Security update for gnutls | 0% Низкий | 26 дней назад | ||
GHSA-pm8w-jq9r-x5rp A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs). | CVSS3: 5.3 | 0% Низкий | около 2 месяцев назад | |
SUSE-SU-2025:4346-1 Security update for gnutls | 0% Низкий | 4 месяца назад | ||
SUSE-SU-2025:4323-1 Security update for gnutls | 0% Низкий | 4 месяца назад | ||
GHSA-337w-h8w7-m899 A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks. | CVSS3: 4 | 0% Низкий | 2 месяца назад | |
BDU:2025-15388 Уязвимость функции gnutls_pkcs11_token_init() (lib/pkcs11_write.c) библиотеки GnuTLS, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.4 | 0% Низкий | 4 месяца назад |
Уязвимостей на страницу