USN-2821-1

Source
https://ubuntu.com/security/notices/USN-2821-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2821-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2821-1
Related
Published
2015-11-30T20:04:50Z
Modified
2026-02-10T04:40:56Z
Summary
gnutls26 vulnerability
Details

It was discovered that GnuTLS incorrectly validated the first byte of padding in CBC modes. A remote attacker could possibly use this issue to perform a padding oracle attack.

References

Affected packages

Ubuntu:14.04:LTS / gnutls26

Package

Name
gnutls26
Purl
pkg:deb/ubuntu/gnutls26@2.12.23-12ubuntu2.3?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.12.23-12ubuntu2.3

Affected versions

2.*
2.12.23-1ubuntu4
2.12.23-1ubuntu5
2.12.23-12ubuntu1
2.12.23-12ubuntu2
2.12.23-12ubuntu2.1
2.12.23-12ubuntu2.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.0.11+really2.12.23-12ubuntu2.3",
            "binary_name": "gnutls-bin"
        },
        {
            "binary_version": "2.12.23-12ubuntu2.3",
            "binary_name": "libgnutls-dev"
        },
        {
            "binary_version": "2.12.23-12ubuntu2.3",
            "binary_name": "libgnutls-openssl27"
        },
        {
            "binary_version": "2.12.23-12ubuntu2.3",
            "binary_name": "libgnutls26"
        },
        {
            "binary_version": "2.12.23-12ubuntu2.3",
            "binary_name": "libgnutlsxx27"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2821-1.json"
cves_map
{
    "ecosystem": "Ubuntu:14.04:LTS",
    "cves": []
}