CVE-2017-7869

Published: 14 April 2017

GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.

Priority

Low

CVSS 3 base score: 7.5

Status

Package Release Status
gnutls26
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 20.10 (Groovy Gorilla) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.12.23-12ubuntu2.8)
Ubuntu 12.04 ESM (Precise Pangolin) Needed

gnutls28
Launchpad, Ubuntu, Debian
Upstream
Released (3.5.8-4)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(3.5.8-5ubuntu1)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(3.5.8-5ubuntu1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(3.5.8-5ubuntu1)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (3.4.10-4ubuntu1.3)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)
Ubuntu 12.04 ESM (Precise Pangolin) Does not exist
(precise was needed)
Patches:
Upstream: https://gitlab.com/gnutls/gnutls/commit/51464af713d71802e3c6d5ac15f1a95132a354fe