First published: Thu Sep 08 2016(Updated: )
It was found an issue in certificate validation using OCSP responses caused by not verifying the serial length, which can falsely report a certificate as valid. Upstream patch: <a href="https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9">https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9</a> External References: <a href="https://www.gnutls.org/security.html">https://www.gnutls.org/security.html</a> <a href="https://lists.gnupg.org/pipermail/gnutls-devel/2016-September/008146.html">https://lists.gnupg.org/pipermail/gnutls-devel/2016-September/008146.html</a>
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/gnutls | <3.4.15 | 3.4.15 |
redhat/gnutls | <3.5.4 | 3.5.4 |
GNU GnuTLS | <=3.4.14 | |
GNU GnuTLS | =3.5.0 | |
GNU GnuTLS | =3.5.1 | |
GNU GnuTLS | =3.5.2 | |
GNU GnuTLS | =3.5.3 | |
debian/gnutls28 | 3.7.1-5+deb11u5 3.7.1-5+deb11u6 3.7.9-2+deb12u3 3.8.8-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.