Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | gnutls28 | <Â 3.5.8-1 | gnutls28_3.5.8-1_all.deb |
Debian | 11 | all | gnutls28 | <Â 3.5.8-1 | gnutls28_3.5.8-1_all.deb |
Debian | 10 | all | gnutls28 | <Â 3.5.8-1 | gnutls28_3.5.8-1_all.deb |
Debian | 999 | all | gnutls28 | <Â 3.5.8-1 | gnutls28_3.5.8-1_all.deb |
Debian | 13 | all | gnutls28 | <Â 3.5.8-1 | gnutls28_3.5.8-1_all.deb |