A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
{
"binaries": [
{
"binary_version": "3.0.11+really2.12.23-12ubuntu2.7",
"binary_name": "gnutls-bin"
},
{
"binary_version": "2.12.23-12ubuntu2.7",
"binary_name": "libgnutls-dev"
},
{
"binary_version": "2.12.23-12ubuntu2.7",
"binary_name": "libgnutls-openssl27"
},
{
"binary_version": "2.12.23-12ubuntu2.7",
"binary_name": "libgnutls26"
},
{
"binary_version": "2.12.23-12ubuntu2.7",
"binary_name": "libgnutlsxx27"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "3.4.10-4ubuntu1.2",
"binary_name": "gnutls-bin"
},
{
"binary_version": "3.4.10-4ubuntu1.2",
"binary_name": "guile-gnutls"
},
{
"binary_version": "3.4.10-4ubuntu1.2",
"binary_name": "libgnutls-dev"
},
{
"binary_version": "3.4.10-4ubuntu1.2",
"binary_name": "libgnutls-openssl27"
},
{
"binary_version": "3.4.10-4ubuntu1.2",
"binary_name": "libgnutls28-dev"
},
{
"binary_version": "3.4.10-4ubuntu1.2",
"binary_name": "libgnutls30"
},
{
"binary_version": "3.4.10-4ubuntu1.2",
"binary_name": "libgnutlsxx28"
}
],
"availability": "No subscription required"
}