A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
{ "binaries": [ { "binary_version": "3.0.11+really2.12.23-12ubuntu2.6", "binary_name": "gnutls-bin" }, { "binary_version": "2.12.23-12ubuntu2.6", "binary_name": "libgnutls-dev" }, { "binary_version": "2.12.23-12ubuntu2.6", "binary_name": "libgnutls-openssl27" }, { "binary_version": "2.12.23-12ubuntu2.6", "binary_name": "libgnutls26" }, { "binary_version": "2.12.23-12ubuntu2.6", "binary_name": "libgnutlsxx27" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "3.4.10-4ubuntu1.2", "binary_name": "gnutls-bin" }, { "binary_version": "3.4.10-4ubuntu1.2", "binary_name": "guile-gnutls" }, { "binary_version": "3.4.10-4ubuntu1.2", "binary_name": "libgnutls-dev" }, { "binary_version": "3.4.10-4ubuntu1.2", "binary_name": "libgnutls-openssl27" }, { "binary_version": "3.4.10-4ubuntu1.2", "binary_name": "libgnutls28-dev" }, { "binary_version": "3.4.10-4ubuntu1.2", "binary_name": "libgnutls30" }, { "binary_version": "3.4.10-4ubuntu1.2", "binary_name": "libgnutlsxx28" } ], "availability": "No subscription required" }