Описание
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
gnutls28 | fixed | 3.5.8-1 | package | |
gnutls28 | fixed | 3.3.8-6+deb8u5 | jessie | package |
gnutls26 | removed | package | ||
gnutls26 | no-dsa | wheezy | package |
Примечания
OpenPGP-related issue
https://gnutls.org/security.html#GNUTLS-SA-2017-2
https://gitlab.com/gnutls/gnutls/commit/94fcf1645ea17223237aaf8d19132e004afddc1a
EPSS
Связанные уязвимости
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Уязвимость функции read_attribute в библиотеке GnuTLS, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказывать воздействие на целостность и доступность данных
EPSS