CVE-2017-5336

Priority
Medium
Description
Stack-based buffer overflow in the cdk_pk_get_keyid function in
lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows
remote attackers to have unspecified impact via a crafted OpenPGP
certificate.
References
Notes
 mdeslaur> reproducer https://gitlab.com/gnutls/gnutls/commit/611098e2f01fd8c3a5a625d61f26c56fcb3d770c
Assigned-to
mdeslaur
Package
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):DNE
Ubuntu 12.04 ESM (Precise Pangolin):released (2.12.14-5ubuntu3.13)
Ubuntu 14.04 LTS (Trusty Tahr):released (2.12.23-12ubuntu2.6)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 17.04 (Zesty Zapus):DNE
Package
Upstream:needs-triage
Ubuntu 17.10 (Artful Aardvark):released (3.5.6-4ubuntu3)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):released (3.4.10-4ubuntu1.2)
Ubuntu 17.04 (Zesty Zapus):released (3.5.6-4ubuntu3)
Patches:
Upstream:https://gitlab.com/gnutls/gnutls/commit/5140422e0d7319a8e2fe07f02cbcafc4d6538732
Upstream:https://gitlab.com/gnutls/gnutls/commit/7dec871f82e205107a81281e3286f0aa9caa93b3 (3.3)
More Information

Updated: 2017-10-17 19:14:41 UTC (commit 13537)