Advisory Published

USN-3183-2: GnuTLS vulnerability

First published: Mon Mar 20 2017(Updated: )

USN-3183-1 fixed CVE-2016-8610 in GnuTLS in Ubuntu 16.04 LTS and Ubuntu 16.10. This update provides the corresponding update for Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Original advisory details: Stefan Buehler discovered that GnuTLS incorrectly verified the serial length of OCSP responses. A remote attacker could possibly use this issue to bypass certain certificate validation measures. This issue only applied to Ubuntu 16.04 LTS. (CVE-2016-7444) Shi Lei discovered that GnuTLS incorrectly handled certain warning alerts. A remote attacker could possibly use this issue to cause GnuTLS to hang, resulting in a denial of service. This issue has only been addressed in Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-8610) It was discovered that GnuTLS incorrectly decoded X.509 certificates with a Proxy Certificate Information extension. A remote attacker could use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2017-5334) It was discovered that GnuTLS incorrectly handled certain OpenPGP certificates. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2017-5335, CVE-2017-5336, CVE-2017-5337)

Affected SoftwareAffected VersionHow to fix
All of
ubuntu/libgnutls26<2.12.23-12ubuntu2.7
2.12.23-12ubuntu2.7
Ubuntu gir1.2-packagekitglib-1.0=14.04
All of
ubuntu/libgnutls26<2.12.14-5ubuntu3.14
2.12.14-5ubuntu3.14
Ubuntu gir1.2-packagekitglib-1.0=12.04

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of USN-3183-2?

    USN-3183-2 addresses a medium-severity vulnerability in GnuTLS related to OCSP serial length verification.

  • How do I fix USN-3183-2?

    To fix USN-3183-2, update the libgnutls26 package to version 2.12.23-12ubuntu2.7 for Ubuntu 14.04 or version 2.12.14-5ubuntu3.14 for Ubuntu 12.04.

  • What is the affected software in USN-3183-2?

    USN-3183-2 affects the libgnutls26 package on Ubuntu versions 12.04 and 14.04.

  • What is CVE-2016-8610 in relation to USN-3183-2?

    CVE-2016-8610 is the identifier for the vulnerability that USN-3183-2 addresses in the GnuTLS library.

  • Which Ubuntu releases are impacted by USN-3183-2?

    USN-3183-2 impacts Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203