An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a norenegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application's error handling path, where the gnutlsdeinit function is called after detecting a handshake failure.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.6.13-2ubuntu1.3", "binary_name": "gnutls-bin" }, { "binary_version": "3.6.13-2ubuntu1.3", "binary_name": "gnutls-bin-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.3", "binary_name": "gnutls-doc" }, { "binary_version": "3.6.13-2ubuntu1.3", "binary_name": "guile-gnutls" }, { "binary_version": "3.6.13-2ubuntu1.3", "binary_name": "guile-gnutls-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.3", "binary_name": "libgnutls-dane0" }, { "binary_version": "3.6.13-2ubuntu1.3", "binary_name": "libgnutls-dane0-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.3", "binary_name": "libgnutls-openssl27" }, { "binary_version": "3.6.13-2ubuntu1.3", "binary_name": "libgnutls-openssl27-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.3", "binary_name": "libgnutls28-dev" }, { "binary_version": "3.6.13-2ubuntu1.3", "binary_name": "libgnutls30" }, { "binary_version": "3.6.13-2ubuntu1.3", "binary_name": "libgnutls30-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.3", "binary_name": "libgnutlsxx28" }, { "binary_version": "3.6.13-2ubuntu1.3", "binary_name": "libgnutlsxx28-dbgsym" } ] }