lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "gnutls-bin", "binary_version": "3.0.11+really2.12.23-12ubuntu2" }, { "binary_name": "gnutls26-doc", "binary_version": "2.12.23-12ubuntu2" }, { "binary_name": "libgnutls-dev", "binary_version": "2.12.23-12ubuntu2" }, { "binary_name": "libgnutls-openssl27", "binary_version": "2.12.23-12ubuntu2" }, { "binary_name": "libgnutls26", "binary_version": "2.12.23-12ubuntu2" }, { "binary_name": "libgnutls26-dbg", "binary_version": "2.12.23-12ubuntu2" }, { "binary_name": "libgnutlsxx27", "binary_version": "2.12.23-12ubuntu2" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "guile-gnutls", "binary_version": "3.2.11-2ubuntu1" }, { "binary_name": "libgnutls-xssl0", "binary_version": "3.2.11-2ubuntu1" }, { "binary_name": "libgnutls28", "binary_version": "3.2.11-2ubuntu1" }, { "binary_name": "libgnutls28-dbg", "binary_version": "3.2.11-2ubuntu1" }, { "binary_name": "libgnutls28-dev", "binary_version": "3.2.11-2ubuntu1" }, { "binary_name": "libgnutlsxx28", "binary_version": "3.2.11-2ubuntu1" } ] }