Stack-based buffer overflow in the cdkpkget_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
[
{
"target": {
"file": "lib/opencdk/pubkey.c"
},
"id": "CVE-2017-5336-a1787a02",
"signature_type": "Line",
"signature_version": "v1",
"deprecated": false,
"source": "https://gitlab.com/gnutls/gnutls@5140422e0d7319a8e2fe07f02cbcafc4d6538732",
"digest": {
"threshold": 0.9,
"line_hashes": [
"21419254868658269228554126738547589629",
"164723427245823845934459564536113855054",
"11149741279561670874961811580892393100",
"51153560472736524860767748030055726195",
"97350090329759179778288311541036476568",
"163786016319087365698374050779943209887",
"177809315265781724751664386040412784585",
"45922216214461055299633574467633644091"
]
}
},
{
"target": {
"function": "cdk_pk_get_keyid",
"file": "lib/opencdk/pubkey.c"
},
"id": "CVE-2017-5336-a676e2ce",
"signature_type": "Function",
"signature_version": "v1",
"deprecated": false,
"source": "https://gitlab.com/gnutls/gnutls@5140422e0d7319a8e2fe07f02cbcafc4d6538732",
"digest": {
"function_hash": "31192692847429562344483029146720570329",
"length": 876.0
}
}
]