Bug 1412236 (CVE-2017-5336)

Summary: CVE-2017-5336 gnutls: Stack overflow in cdk_pk_get_keyid
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: hkario, jv+fedora, nmavrogi, sardella, slawomir, tmraz, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: gnutls 3.3.26, gnutls 3.5.8 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:05:20 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1411838, 1411845, 1413836, 1413874    
Bug Blocks: 1386080, 1411837, 1415638    

Description Andrej Nemec 2017-01-11 15:23:52 UTC
A vulnerability was found in gnutls. A stack overflow could occur in opencdk in the cdk_pk_get_keyid function. A memory corruption could occur when parsing a maliciously crafted OpenPGP certificate.



Upstream patch:


Comment 1 Andrej Nemec 2017-01-11 15:31:21 UTC
Created gnutls tracking bugs for this issue:

Affects: fedora-all [bug 1411838]

Comment 2 Andrej Nemec 2017-01-11 15:31:27 UTC
Created gnutls30 tracking bugs for this issue:

Affects: epel-6 [bug 1411845]

Comment 6 Nikos Mavrogiannopoulos 2017-01-17 12:16:15 UTC
Reproducer at:

Comment 7 Nikos Mavrogiannopoulos 2017-02-13 14:48:21 UTC
Maps to: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340

Comment 8 errata-xmlrpc 2017-03-21 09:05:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2017:0574 https://rhn.redhat.com/errata/RHSA-2017-0574.html

Comment 9 errata-xmlrpc 2017-08-01 08:50:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:2292 https://access.redhat.com/errata/RHSA-2017:2292