CVE-2016-7444

Priority
Description
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before
3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP
response, which might allow remote attackers to bypass an intended
certificate validation mechanism via vectors involving trailing bytes left
by gnutls_malloc.
Assigned-to
mdeslaur
Notes
Package
Upstream:not-affected
Ubuntu 12.04 ESM (Precise Pangolin):not-affected
Ubuntu 14.04 ESM (Trusty Tahr):not-affected
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
Package
Upstream:released (3.5.3-4)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was not-affected [code not present])
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):released (3.4.10-4ubuntu1.2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (3.5.3-4ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (3.5.3-4ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (3.5.3-4ubuntu1)
Patches:
Upstream:https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9
Upstream:https://gitlab.com/gnutls/gnutls/commit/c089e019ef83a77b2fdca24d0875ef25f6b38f1a (3.3)
More Information

Updated: 2019-12-05 21:08:25 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)