Stack-based buffer overflow in the cdkpkget_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "42.1"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "42.2"
}
]
}
]
}{
"source": "CPE_FIELD",
"cpe": [
"cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "3.3.25"
},
{
"last_affected": "3.5.0"
},
{
"last_affected": "3.5.1"
},
{
"last_affected": "3.5.2"
},
{
"last_affected": "3.5.3"
},
{
"last_affected": "3.5.4"
},
{
"last_affected": "3.5.5"
},
{
"last_affected": "3.5.6"
},
{
"last_affected": "3.5.7"
}
]
}