Search for packages
purl | pkg:deb/debian/gnutls26@2.12.20-8%2Bdeb7u5 |
Vulnerability | Summary | Fixed by |
---|---|---|
This package is not known to be affected by vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-4p9b-sbpx-jfdj | security update |
CVE-2015-8313
|
VCID-7e5p-aazx-tffp |
CVE-2013-2116
|
|
VCID-7svy-v5cp-u3fd | Security researcher Karthikeyan Bhargavan reported an issue in Network Security Services (NSS) where MD5 signatures in the server signature within the TLS 1.2 ServerKeyExchange message are still accepted. This is an issue since NSS has officially disallowed the accepting MD5 as a hash algorithm in signatures since 2011. This issues exposes NSS based clients such as Firefox to theoretical collision-based forgery attacks. This issue was fixed in NSS version 3.20.2. |
CVE-2015-7575
|
VCID-99hm-5jbk-pyhe |
CVE-2015-0282
|
|
VCID-jrwh-9nw8-m7fd |
CVE-2014-0092
|
|
VCID-wb6p-qxqh-7yh3 |
CVE-2014-3466
|
|
VCID-xyrw-13hg-97ba |
CVE-2014-1959
|
|
VCID-zg6w-4zts-rqbk | GnuTLS before 3.3.13 does not validate that the signature algorithms match when importing a certificate. |
CVE-2015-0294
|