GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
precise/esm gnutls26 None
trusty gnutls26 2.12.23-12ubuntu2.8
gnutls28 None
upstream gnutls28 3.5.8-4
xenial gnutls28 3.4.10-4ubuntu1.3
yakkety gnutls28 3.5.3-5ubuntu1.2
zesty gnutls28 3.5.6-4ubuntu4.1


Release Package Reason
precise gnutls26 ignored
gnutls28 ignored
vivid/stable-phone-overlay gnutls26 DNE
gnutls28 ignored
vivid/ubuntu-core gnutls26 DNE
gnutls28 ignored
xenial gnutls26 DNE
yakkety gnutls26 DNE
zesty gnutls26 DNE
artful gnutls26 DNE
gnutls28 not-affected
devel gnutls26 DNE
gnutls28 not-affected
precise/esm gnutls28 DNE

Needs Triage

Release Package Reason
upstream gnutls26 needs-triage