Описание
Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | gnutls | Will not fix | ||
| Red Hat Enterprise Linux 6 | gnutls | Fixed | RHSA-2017:0574 | 21.03.2017 |
| Red Hat Enterprise Linux 7 | gnutls | Fixed | RHSA-2017:2292 | 01.08.2017 |
Показывать по
Дополнительная информация
Статус:
5.3 Medium
CVSS3
Связанные уязвимости
Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/op ...
Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
Уязвимость функции cdk_pk_get_keyid компонента lib/opencdk/pubkey.c операционной системы OpenSUSE Leap и библиотеки GnuTLS, позволяющая нарушителю оказать неопределенное воздействие
5.3 Medium
CVSS3