GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer dereference while decoding a status response TLS extension with valid contents. This could lead to a crash of the GnuTLS server application.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "gnutls-bin-dbgsym": "3.4.10-4ubuntu1.3", "libgnutls-openssl27-dbgsym": "3.4.10-4ubuntu1.3", "gnutls-doc": "3.4.10-4ubuntu1.3", "libgnutls28-dev": "3.4.10-4ubuntu1.3", "libgnutls-openssl27": "3.4.10-4ubuntu1.3", "guile-gnutls-dbgsym": "3.4.10-4ubuntu1.3", "libgnutlsxx28-dbgsym": "3.4.10-4ubuntu1.3", "libgnutls30": "3.4.10-4ubuntu1.3", "gnutls-bin": "3.4.10-4ubuntu1.3", "guile-gnutls": "3.4.10-4ubuntu1.3", "libgnutls30-dbgsym": "3.4.10-4ubuntu1.3", "libgnutls-dev": "3.4.10-4ubuntu1.3", "libgnutlsxx28": "3.4.10-4ubuntu1.3" } ] }