Search CVE reports
11 – 20 of 45184 results
Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting...
1 affected package
wolfssl
| Package | 16.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Improper input validation in the TLS 1.3 KeyShareEntry parsing in wolfSSL v5.8.2 on multiple platforms allows a remote unauthenticated attacker to cause a denial-of-service by sending a crafted ClientHello message containing...
1 affected package
wolfssl
| Package | 16.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
With TLS 1.3 pre-shared key (PSK) a malicious or faulty server could ignore the request for PFS (perfect forward secrecy) and the client would continue on with the connection using PSK without PFS. This happened when...
1 affected package
wolfssl
| Package | 16.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Improper input validation in the TLS 1.3 CertificateVerify signature algorithm negotiation in wolfSSL 5.8.2 and earlier on multiple platforms allows for downgrading the signature algorithm used. For example when a client sends...
1 affected package
wolfssl
| Package | 16.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause a denial-of-service via a crafted ClientHello message...
1 affected package
wolfssl
| Package | 16.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
The server previously verified the TLS 1.3 PSK binder using a non-constant time method which could potentially leak information about the PSK binder
1 affected package
wolfssl
| Package | 16.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt. This issue is hit specifically with a call to the function wc_XChaCha20Poly1305_Decrypt() which is not used with TLS connections, only from direct...
1 affected package
wolfssl
| Package | 16.04 LTS |
|---|---|
| wolfssl | Needs evaluation |
(Improper access control within AMD SEV-SNP could allow an admin privil ...)
1 affected package
amd64-microcode
| Package | 16.04 LTS |
|---|---|
| amd64-microcode | Needs evaluation |
(A vulnerability was detected in DCMTK up to 3.6.7. The impacted elemen ...)
1 affected package
dcmtk
| Package | 16.04 LTS |
|---|---|
| dcmtk | Needs evaluation |
Stack write buffer overflow
1 affected package
gnutls28
| Package | 16.04 LTS |
|---|---|
| gnutls28 | Needs evaluation |