Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "3.0.11+really2.12.23-12ubuntu2.6", "binary_name": "gnutls-bin" }, { "binary_version": "2.12.23-12ubuntu2.6", "binary_name": "libgnutls-dev" }, { "binary_version": "2.12.23-12ubuntu2.6", "binary_name": "libgnutls-openssl27" }, { "binary_version": "2.12.23-12ubuntu2.6", "binary_name": "libgnutls26" }, { "binary_version": "2.12.23-12ubuntu2.6", "binary_name": "libgnutlsxx27" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "3.4.10-4ubuntu1.2", "binary_name": "gnutls-bin" }, { "binary_version": "3.4.10-4ubuntu1.2", "binary_name": "guile-gnutls" }, { "binary_version": "3.4.10-4ubuntu1.2", "binary_name": "libgnutls-dev" }, { "binary_version": "3.4.10-4ubuntu1.2", "binary_name": "libgnutls-openssl27" }, { "binary_version": "3.4.10-4ubuntu1.2", "binary_name": "libgnutls28-dev" }, { "binary_version": "3.4.10-4ubuntu1.2", "binary_name": "libgnutls30" }, { "binary_version": "3.4.10-4ubuntu1.2", "binary_name": "libgnutlsxx28" } ] }