A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "gnutls-bin", "binary_version": "3.0.11+really2.12.23-12ubuntu2.6" }, { "binary_name": "libgnutls-dev", "binary_version": "2.12.23-12ubuntu2.6" }, { "binary_name": "libgnutls-openssl27", "binary_version": "2.12.23-12ubuntu2.6" }, { "binary_name": "libgnutls26", "binary_version": "2.12.23-12ubuntu2.6" }, { "binary_name": "libgnutlsxx27", "binary_version": "2.12.23-12ubuntu2.6" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "gnutls-bin", "binary_version": "3.4.10-4ubuntu1.2" }, { "binary_name": "guile-gnutls", "binary_version": "3.4.10-4ubuntu1.2" }, { "binary_name": "libgnutls-dev", "binary_version": "3.4.10-4ubuntu1.2" }, { "binary_name": "libgnutls-openssl27", "binary_version": "3.4.10-4ubuntu1.2" }, { "binary_name": "libgnutls28-dev", "binary_version": "3.4.10-4ubuntu1.2" }, { "binary_name": "libgnutls30", "binary_version": "3.4.10-4ubuntu1.2" }, { "binary_name": "libgnutlsxx28", "binary_version": "3.4.10-4ubuntu1.2" } ] }