GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdkpktread function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.
[
{
"source": "https://gitlab.com/gnutls/gnutls@51464af713d71802e3c6d5ac15f1a95132a354fe",
"id": "CVE-2017-7869-70d8abb2",
"deprecated": false,
"target": {
"file": "lib/opencdk/read-packet.c"
},
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"315517187973016954200676650758376117939",
"302231086772650908591168879301094193115",
"151493713647623769012804597412236177487",
"86994583036609320701315736738305893368",
"126447013365912301270553345766253694292",
"184237442827330821387086062133338706965",
"285672013623904751902476573436088912424",
"148491288965666580963508953535850560491",
"333733986910943430311565020270106789591",
"262820382176498089996584549909193259734"
]
},
"signature_type": "Line"
},
{
"source": "https://gitlab.com/gnutls/gnutls@51464af713d71802e3c6d5ac15f1a95132a354fe",
"id": "CVE-2017-7869-f0ee8c4a",
"deprecated": false,
"target": {
"function": "cdk_pkt_read",
"file": "lib/opencdk/read-packet.c"
},
"signature_version": "v1",
"digest": {
"length": 5217.0,
"function_hash": "268322738235869165733778380507046469527"
},
"signature_type": "Function"
}
]