It was discovered that GnuTLS incorrectly handled sending certain extensions when being used as a client. A remote attacker could use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly execute arbitrary code.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "3.6.13-2ubuntu1.6", "binary_name": "gnutls-bin" }, { "binary_version": "3.6.13-2ubuntu1.6", "binary_name": "gnutls-bin-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.6", "binary_name": "gnutls-doc" }, { "binary_version": "3.6.13-2ubuntu1.6", "binary_name": "guile-gnutls" }, { "binary_version": "3.6.13-2ubuntu1.6", "binary_name": "guile-gnutls-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.6", "binary_name": "libgnutls-dane0" }, { "binary_version": "3.6.13-2ubuntu1.6", "binary_name": "libgnutls-dane0-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.6", "binary_name": "libgnutls-openssl27" }, { "binary_version": "3.6.13-2ubuntu1.6", "binary_name": "libgnutls-openssl27-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.6", "binary_name": "libgnutls28-dev" }, { "binary_version": "3.6.13-2ubuntu1.6", "binary_name": "libgnutls30" }, { "binary_version": "3.6.13-2ubuntu1.6", "binary_name": "libgnutls30-dbgsym" }, { "binary_version": "3.6.13-2ubuntu1.6", "binary_name": "libgnutlsxx28" }, { "binary_version": "3.6.13-2ubuntu1.6", "binary_name": "libgnutlsxx28-dbgsym" } ] }