Search for packages
Package details: pkg:deb/ubuntu/gnutls26@2.12.23-12ubuntu2.6
purl pkg:deb/ubuntu/gnutls26@2.12.23-12ubuntu2.6
Next non-vulnerable version 2.12.23-12ubuntu2.8
Latest non-vulnerable version 2.12.23-12ubuntu2.8
Risk 3.6
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-zr1z-nugx-aaak
Aliases:
CVE-2017-7869
GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.
2.12.23-12ubuntu2.8
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-2hsg-g1y2-aaaj Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate. CVE-2017-5336
VCID-aycq-csac-aaaf The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate. CVE-2017-5335
VCID-dnrm-mtb4-aaah A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. CVE-2016-8610
VCID-qyus-ebpw-aaaq Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate. CVE-2017-5337

Date Actor Action Vulnerability Source VulnerableCode Version