It was discovered that GnuTLS incorrectly handled session ticket encryption keys. A remote attacker could possibly use this issue to bypass authentication or recover sensitive information.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "3.6.13-2ubuntu1.1", "binary_name": "gnutls-bin" }, { "binary_version": "3.6.13-2ubuntu1.1", "binary_name": "gnutls-bin-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.1", "binary_name": "gnutls-doc" }, { "binary_version": "3.6.13-2ubuntu1.1", "binary_name": "guile-gnutls" }, { "binary_version": "3.6.13-2ubuntu1.1", "binary_name": "guile-gnutls-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.1", "binary_name": "libgnutls-dane0" }, { "binary_version": "3.6.13-2ubuntu1.1", "binary_name": "libgnutls-dane0-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.1", "binary_name": "libgnutls-openssl27" }, { "binary_version": "3.6.13-2ubuntu1.1", "binary_name": "libgnutls-openssl27-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.1", "binary_name": "libgnutls28-dev" }, { "binary_version": "3.6.13-2ubuntu1.1", "binary_name": "libgnutls30" }, { "binary_version": "3.6.13-2ubuntu1.1", "binary_name": "libgnutls30-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.1", "binary_name": "libgnutlsxx28" }, { "binary_version": "3.6.13-2ubuntu1.1", "binary_name": "libgnutlsxx28-dbgsym" } ] }