A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Name | Vendor | Start Version | End Version |
---|---|---|---|
Gnutls | Gnu | - (including) | - (including) |
Red Hat Enterprise Linux 10 | RedHat | gnutls-0:3.8.9-9.el10_0.14 | * |
Red Hat Enterprise Linux 8 | RedHat | gnutls-0:3.6.16-8.el8_10.4 | * |
Red Hat Enterprise Linux 8 | RedHat | gnutls-0:3.6.16-8.el8_10.4 | * |
Red Hat Enterprise Linux 9 | RedHat | gnutls-0:3.8.3-6.el9_6.2 | * |
Red Hat Enterprise Linux 9 | RedHat | gnutls-0:3.8.3-6.el9_6.2 | * |
Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions | RedHat | gnutls-0:3.7.6-21.el9_2.4 | * |
Red Hat Enterprise Linux 9.4 Extended Update Support | RedHat | gnutls-0:3.8.3-4.el9_4.4 | * |
Gnutls28 | Ubuntu | devel | * |
Gnutls28 | Ubuntu | esm-infra/bionic | * |
Gnutls28 | Ubuntu | esm-infra/focal | * |
Gnutls28 | Ubuntu | esm-infra/xenial | * |
Gnutls28 | Ubuntu | fips-updates/jammy | * |
Gnutls28 | Ubuntu | jammy | * |
Gnutls28 | Ubuntu | noble | * |
Gnutls28 | Ubuntu | oracular | * |
Gnutls28 | Ubuntu | plucky | * |
Gnutls28 | Ubuntu | questing | * |
Gnutls28 | Ubuntu | upstream | * |