Stack-based buffer overflow in the cdkpkget_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "3.3.25"
},
{
"introduced": "0"
},
{
"last_affected": "3.5.0"
},
{
"introduced": "0"
},
{
"last_affected": "3.5.1"
},
{
"introduced": "0"
},
{
"last_affected": "3.5.2"
},
{
"introduced": "0"
},
{
"last_affected": "3.5.3"
},
{
"introduced": "0"
},
{
"last_affected": "3.5.4"
},
{
"introduced": "0"
},
{
"last_affected": "3.5.5"
},
{
"introduced": "0"
},
{
"last_affected": "3.5.6"
},
{
"introduced": "0"
},
{
"last_affected": "3.5.7"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "42.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "42.2"
}
]
}
]
[
{
"signature_version": "v1",
"target": {
"file": "lib/opencdk/pubkey.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"21419254868658269228554126738547589629",
"164723427245823845934459564536113855054",
"11149741279561670874961811580892393100",
"51153560472736524860767748030055726195",
"97350090329759179778288311541036476568",
"163786016319087365698374050779943209887",
"177809315265781724751664386040412784585",
"45922216214461055299633574467633644091"
]
},
"source": "https://gitlab.com/gnutls/gnutls@5140422e0d7319a8e2fe07f02cbcafc4d6538732",
"signature_type": "Line",
"id": "CVE-2017-5336-a1787a02",
"deprecated": false
},
{
"signature_version": "v1",
"target": {
"function": "cdk_pk_get_keyid",
"file": "lib/opencdk/pubkey.c"
},
"digest": {
"length": 876.0,
"function_hash": "31192692847429562344483029146720570329"
},
"source": "https://gitlab.com/gnutls/gnutls@5140422e0d7319a8e2fe07f02cbcafc4d6538732",
"signature_type": "Function",
"id": "CVE-2017-5336-a676e2ce",
"deprecated": false
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-5336.json"