CVE-2016-7444

Priority
Description
The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before
3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP
response, which might allow remote attackers to bypass an intended
certificate validation mechanism via vectors involving trailing bytes left
by gnutls_malloc.
Assigned-to
mdeslaur
Notes
Package
Upstream:not-affected
Ubuntu 12.04 ESM (Precise Pangolin):not-affected
Ubuntu 14.04 ESM (Trusty Tahr):not-affected
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
Package
Upstream:released (3.5.3-4)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was not-affected [code not present])
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):released (3.4.10-4ubuntu1.2)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (3.5.3-4ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (3.5.3-4ubuntu1)
Patches:
Upstream:https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9
Upstream:https://gitlab.com/gnutls/gnutls/commit/c089e019ef83a77b2fdca24d0875ef25f6b38f1a (3.3)
More Information

Updated: 2020-03-18 22:46:21 UTC (commit 2ea7df7bd1e69e1e489978d2724a936eb3faa1b8)