Description
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before
3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP
response, which might allow remote attackers to bypass an intended
certificate validation mechanism via vectors involving trailing bytes left
by gnutls_malloc.
Package
Upstream: | not-affected
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | not-affected
|
Patches:
Package
Upstream: | released
(3.5.3-4)
|
Ubuntu 18.04 LTS: | not-affected
(3.5.3-4ubuntu1)
|
Ubuntu 16.04 ESM: | released
(3.4.10-4ubuntu1.2)
|
Ubuntu 14.04 ESM: | DNE
(trusty was needed)
|
Patches:
Updated: 2022-04-13 12:31:29 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)