GnuTLS is an Open Source implementation of the TLS and SSL protocols.
Multiple heap and stack overflows and double free vulnerabilities have been discovered in GnuTLS by the OSS-Fuzz project. Please review the CVE identifiers referenced below for details.
A remote attacker could entice a user or automated system to process a specially crafted certificate using an application linked against GnuTLS. This could possibly result in the execution of arbitrary code with the privileges of the process or a Denial of Service condition.
There is no known workaround at this time.
All GnuTLS users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/gnutls-3.3.26"