Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
{
"binaries": [
{
"binary_name": "gnutls-bin",
"binary_version": "3.0.11+really2.12.23-12ubuntu2.6"
},
{
"binary_name": "libgnutls-dev",
"binary_version": "2.12.23-12ubuntu2.6"
},
{
"binary_name": "libgnutls-openssl27",
"binary_version": "2.12.23-12ubuntu2.6"
},
{
"binary_name": "libgnutls26",
"binary_version": "2.12.23-12ubuntu2.6"
},
{
"binary_name": "libgnutlsxx27",
"binary_version": "2.12.23-12ubuntu2.6"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "gnutls-bin",
"binary_version": "3.4.10-4ubuntu1.2"
},
{
"binary_name": "guile-gnutls",
"binary_version": "3.4.10-4ubuntu1.2"
},
{
"binary_name": "libgnutls-dev",
"binary_version": "3.4.10-4ubuntu1.2"
},
{
"binary_name": "libgnutls-openssl27",
"binary_version": "3.4.10-4ubuntu1.2"
},
{
"binary_name": "libgnutls28-dev",
"binary_version": "3.4.10-4ubuntu1.2"
},
{
"binary_name": "libgnutls30",
"binary_version": "3.4.10-4ubuntu1.2"
},
{
"binary_name": "libgnutlsxx28",
"binary_version": "3.4.10-4ubuntu1.2"
}
],
"availability": "No subscription required"
}