Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
{ "binaries": [ { "binary_name": "gnutls-bin", "binary_version": "3.0.11+really2.12.23-12ubuntu2.6" }, { "binary_name": "libgnutls-dev", "binary_version": "2.12.23-12ubuntu2.6" }, { "binary_name": "libgnutls-openssl27", "binary_version": "2.12.23-12ubuntu2.6" }, { "binary_name": "libgnutls26", "binary_version": "2.12.23-12ubuntu2.6" }, { "binary_name": "libgnutlsxx27", "binary_version": "2.12.23-12ubuntu2.6" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "gnutls-bin", "binary_version": "3.4.10-4ubuntu1.2" }, { "binary_name": "guile-gnutls", "binary_version": "3.4.10-4ubuntu1.2" }, { "binary_name": "libgnutls-dev", "binary_version": "3.4.10-4ubuntu1.2" }, { "binary_name": "libgnutls-openssl27", "binary_version": "3.4.10-4ubuntu1.2" }, { "binary_name": "libgnutls28-dev", "binary_version": "3.4.10-4ubuntu1.2" }, { "binary_name": "libgnutls30", "binary_version": "3.4.10-4ubuntu1.2" }, { "binary_name": "libgnutlsxx28", "binary_version": "3.4.10-4ubuntu1.2" } ], "availability": "No subscription required" }