Errata overview
Errata ID 334
Date 2018-04-18
Source package gnutls28
Fixed in version 3.3.8-6+deb8u7
Description
This update addresses the following issues:
* Double free vulnerability in the gnutls_x509_ext_import_proxy function
  allows remote attackers to have unspecified impact via crafted policy
  language information in an X.509 certificate with a Proxy Certificate
  Information extension. (CVE-2017-5334)
* The stream reading functions in lib/opencdk/read-packet.c allow remote
  attackers to cause a denial of service (out-of-memory error and crash) via
  a crafted OpenPGP certificate. (CVE-2017-5335)
* Stack-based buffer overflow in the cdk_pk_get_keyid function in
  lib/opencdk/pubkey.c allows remote attackers to have unspecified impact via
  a crafted OpenPGP certificate. (CVE-2017-5336)
* Multiple heap-based buffer overflows in the read_attribute function allow
  remote attackers to have unspecified impact via a crafted OpenPGP
  certificate. (CVE-2017-5337)
* GnuTLS is vulnerable to a NULL pointer dereference while decoding a status
  response TLS extension with valid contents. This could lead to a crash of
  the GnuTLS server application. (CVE-2017-7507)
* GnuTLS has an out-of-bounds write caused by an integer overflow and
  heap-based buffer overflow related to the cdk_pkt_read function in
  opencdk/read-packet.c. This issue is a subset of the vendor's
  GNUTLS-SA-2017-3 report. (CVE-2017-7869)
Additional notes
CVE ID CVE-2017-5334
CVE-2017-5335
CVE-2017-5336
CVE-2017-5337
CVE-2017-7507
CVE-2017-7869
UCS Bug number #44855