Two errors in the "asn1findnode()" function (lib/parser_aux.c) within GnuTLS libtasn1 version 4.10 can be exploited to cause a stacked-based buffer overflow by tricking a user into processing a specially crafted assignments file via the e.g. asn1Coding utility.
{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "3.4-3ubuntu0.5",
            "binary_name": "libtasn1-3-bin"
        },
        {
            "binary_version": "3.4-3ubuntu0.5",
            "binary_name": "libtasn1-3-dev"
        },
        {
            "binary_version": "3.4-3ubuntu0.5",
            "binary_name": "libtasn1-6"
        },
        {
            "binary_version": "3.4-3ubuntu0.5",
            "binary_name": "libtasn1-6-dev"
        },
        {
            "binary_version": "3.4-3ubuntu0.5",
            "binary_name": "libtasn1-bin"
        }
    ]
}
          {
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "4.7-3ubuntu0.16.04.2",
            "binary_name": "libtasn1-3-bin"
        },
        {
            "binary_version": "4.7-3ubuntu0.16.04.2",
            "binary_name": "libtasn1-6"
        },
        {
            "binary_version": "4.7-3ubuntu0.16.04.2",
            "binary_name": "libtasn1-6-dev"
        },
        {
            "binary_version": "4.7-3ubuntu0.16.04.2",
            "binary_name": "libtasn1-bin"
        }
    ]
}