CVE-2016-7444

Priority
Low
Description
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before
3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP
response, which might allow remote attackers to bypass an intended
certificate validation mechanism via vectors involving trailing bytes left
by gnutls_malloc.
References
Bugs
Assigned-to
mdeslaur
Package
Upstream:not-affected
Ubuntu 17.10 (Artful Aardvark):DNE
Ubuntu 12.04 ESM (Precise Pangolin):not-affected
Ubuntu 14.04 LTS (Trusty Tahr):not-affected
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 17.04 (Zesty Zapus):DNE
Package
Upstream:released (3.5.3-4)
Ubuntu 17.10 (Artful Aardvark):not-affected (3.5.3-4ubuntu1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was not-affected [code not present])
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):released (3.4.10-4ubuntu1.2)
Ubuntu 17.04 (Zesty Zapus):not-affected (3.5.3-4ubuntu1)
Patches:
Upstream:https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9
Upstream:https://gitlab.com/gnutls/gnutls/commit/c089e019ef83a77b2fdca24d0875ef25f6b38f1a (3.3)
More Information

Updated: 2017-10-17 19:14:22 UTC (commit 13537)