Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-14441 | Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate. |
Ubuntu USN |
USN-3183-1 | GnuTLS vulnerabilities |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-05T14:55:35.805Z
Reserved: 2017-01-10T00:00:00.000Z
Link: CVE-2017-5336
No data.
Status : Modified
Published: 2017-03-24T15:59:00.873
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-5336
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN