Name | CVE-2016-7444 |
Description | The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
gnutls28 (PTS) | bullseye | 3.7.1-5+deb11u5 | fixed |
bullseye (security) | 3.7.1-5+deb11u6 | fixed | |
bookworm | 3.7.9-2+deb12u3 | fixed | |
sid, trixie | 3.8.8-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
gnutls28 | source | jessie | 3.3.8-6+deb8u4 | |||
gnutls28 | source | (unstable) | 3.5.3-4 |
https://gnutls.org/security.html#GNUTLS-SA-2016-3
http://lists.gnutls.org/pipermail/gnutls-devel/2016-September/008146.html
Upstream fix: https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9
https://bugzilla.redhat.com/show_bug.cgi?id=1374266
https://www.openwall.com/lists/oss-security/2016/09/18/3