GnuTLS vulnerabilities in Ubuntu 11.10, 11.04, 10.10, 10.04, 8.04 with gnutls13 and gnutls26 package
Reporter | Title | Published | Views | Family All 109 |
---|---|---|---|---|
![]() | gnutls security update | 28 Mar 201200:00 | – | oraclelinux |
![]() | gnutls security update | 27 Mar 201200:00 | – | oraclelinux |
![]() | RedHat Update for gnutls RHSA-2012:0429-01 | 9 Jul 201200:00 | – | openvas |
![]() | Fedora Update for gnutls FEDORA-2012-4569 | 11 Apr 201200:00 | – | openvas |
![]() | Ubuntu Update for gnutls26 USN-1418-1 | 11 Apr 201200:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-1418-1) | 11 Apr 201200:00 | – | openvas |
![]() | RedHat Update for gnutls RHSA-2012:0429-01 | 9 Jul 201200:00 | – | openvas |
![]() | Fedora Update for gnutls FEDORA-2012-4569 | 11 Apr 201200:00 | – | openvas |
![]() | Amazon Linux: Security Advisory (ALAS-2012-59) | 8 Sep 201500:00 | – | openvas |
![]() | Oracle: Security Advisory (ELSA-2012-0429) | 6 Oct 201500:00 | – | openvas |
Source | Link |
---|---|
ubuntu | www.ubuntu.com/security/CVE-2012-1573 |
ubuntu | www.ubuntu.com/security/CVE-2011-4128 |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Ubuntu | 8.04 | noarch | libgnutls13 | 2.0.4-1ubuntu2.7 | UNKNOWN |
Ubuntu | 8.04 | noarch | gnutls-bin | 2.0.4-1ubuntu2.7 | UNKNOWN |
Ubuntu | 8.04 | noarch | libgnutls-dev | 2.0.4-1ubuntu2.7 | UNKNOWN |
Ubuntu | 8.04 | noarch | libgnutls13-dbg | 2.0.4-1ubuntu2.7 | UNKNOWN |
Ubuntu | 8.04 | noarch | libgnutlsxx13 | 2.0.4-1ubuntu2.7 | UNKNOWN |
Ubuntu | 11.10 | noarch | libgnutls26 | 2.10.5-1ubuntu3.1 | UNKNOWN |
Ubuntu | 11.10 | noarch | gnutls-bin | 2.10.5-1ubuntu3.1 | UNKNOWN |
Ubuntu | 11.10 | noarch | guile-gnutls | 2.10.5-1ubuntu3.1 | UNKNOWN |
Ubuntu | 11.10 | noarch | libgnutls-dev | 2.10.5-1ubuntu3.1 | UNKNOWN |
Ubuntu | 11.10 | noarch | libgnutls26-dbg | 2.10.5-1ubuntu3.1 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo