Stack-based buffer overflow in the cdkpkget_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.
{ "vanir_signatures": [ { "source": "https://gitlab.com/gnutls/gnutls@5140422e0d7319a8e2fe07f02cbcafc4d6538732", "deprecated": false, "signature_version": "v1", "digest": { "line_hashes": [ "21419254868658269228554126738547589629", "164723427245823845934459564536113855054", "11149741279561670874961811580892393100", "51153560472736524860767748030055726195", "97350090329759179778288311541036476568", "163786016319087365698374050779943209887", "177809315265781724751664386040412784585", "45922216214461055299633574467633644091" ], "threshold": 0.9 }, "signature_type": "Line", "id": "CVE-2017-5336-a1787a02", "target": { "file": "lib/opencdk/pubkey.c" } }, { "source": "https://gitlab.com/gnutls/gnutls@5140422e0d7319a8e2fe07f02cbcafc4d6538732", "deprecated": false, "signature_version": "v1", "digest": { "function_hash": "31192692847429562344483029146720570329", "length": 876.0 }, "signature_type": "Function", "id": "CVE-2017-5336-a676e2ce", "target": { "file": "lib/opencdk/pubkey.c", "function": "cdk_pk_get_keyid" } } ] }