Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS prior to 3.3.26 and 3.5.x prior to 3.5.8 allows remote malicious users to have unspecified impact via a crafted OpenPGP certificate.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
opensuse leap 42.1 |
||
opensuse leap 42.2 |
||
gnu gnutls 3.5.2 |
||
gnu gnutls 3.5.3 |
||
gnu gnutls 3.5.4 |
||
gnu gnutls 3.5.5 |
||
gnu gnutls 3.5.1 |
||
gnu gnutls 3.5.0 |
||
gnu gnutls |
||
gnu gnutls 3.5.6 |
||
gnu gnutls 3.5.7 |