Search CVE reports
851 – 860 of 49990 results
TLS protocol dissector heap overflow in Wireshark 4.6.0 to 4.6.4 allows denial of service and possible code execution
1 affected package
wireshark
| Package | 16.04 LTS |
|---|---|
| wireshark | Needs evaluation |
AFP Spotlight protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
1 affected package
wireshark
| Package | 16.04 LTS |
|---|---|
| wireshark | Needs evaluation |
ICMPv6 PvD protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service
1 affected package
wireshark
| Package | 16.04 LTS |
|---|---|
| wireshark | Needs evaluation |
For a server using an RSA key backed by a PKCS#11 token, a client sending an extremely short premaster secret during an RSA key exchange could trigger a short heap overread.
1 affected package
gnutls28
| Package | 16.04 LTS |
|---|---|
| gnutls28 | Needs evaluation |
Appending to a PKCS#12 bag that already contained 32 elements could write past the bag's internal array.
1 affected package
gnutls28
| Package | 16.04 LTS |
|---|---|
| gnutls28 | Needs evaluation |
Changing the Security Officer PIN with gnutls_pkcs11_token_set_pin() with oldpin == NULL for a token lacking a protected authentication path led to a use-after-free.
1 affected package
gnutls28
| Package | 16.04 LTS |
|---|---|
| gnutls28 | Needs evaluation |
Validation of certificates with oversized Subject Alternative Names would fall back to checking DNS hostnames against Common Name.
1 affected package
gnutls28
| Package | 16.04 LTS |
|---|---|
| gnutls28 | Needs evaluation |
Certificates containing URI or SRV Subject Alternative Names would fall back to checking DNS hostnames against Common Name, allowing potential misuse of such certificates beyond their original purpose.
1 affected package
gnutls28
| Package | 16.04 LTS |
|---|---|
| gnutls28 | Needs evaluation |
The comparator function used for ordering DTLS packets by sequence numbers did not follow qsort comparator contracts in case of packets with duplicate sequence numbers, which could lead to undefined behaviour.
1 affected package
gnutls28
| Package | 16.04 LTS |
|---|---|
| gnutls28 | Needs evaluation |
A flaw was found in gnutls. This vulnerability occurs because gnutls performs case-sensitive comparisons of `nameConstraints` labels, specifically for `dNSName` (DNS) or `rfc822Name` (email) constraints within `excludedSubtrees`...
1 affected package
gnutls28
| Package | 16.04 LTS |
|---|---|
| gnutls28 | Needs evaluation |