ALPINE-CVE-2016-7444

Source
https://security.alpinelinux.org/vuln/CVE-2016-7444
Import Source
https://storage.googleapis.com/cve-osv-conversion/alpine/ALPINE-CVE-2016-7444.json
JSON Data
https://api.osv.dev/v1/vulns/ALPINE-CVE-2016-7444
Upstream
Published
2016-09-27T15:59:12Z
Modified
2025-09-30T05:04:15.106355Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

The gnutlsocsprespcheckcrt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.

References

Affected packages

Alpine:v3.2 / gnutls

Package

Name
gnutls
Purl
pkg:apk/alpine/gnutls?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.5-r1

Affected versions

2.*

2.6.4-r0
2.6.5-r0
2.6.6-r0
2.8.1-r0
2.8.1-r1
2.8.3-r0
2.8.5-r0
2.8.5-r1
2.8.6-r0
2.8.6-r1
2.8.6-r2
2.8.6-r3
2.10.4-r0
2.10.5-r0
2.10.5-r1
2.10.5-r2
2.12.6.1-r0
2.12.7-r0
2.12.16-r0

3.*

3.0.17-r0
3.0.18-r0
3.0.19-r0
3.0.20-r0
3.0.21-r0
3.0.22-r0
3.1.0-r0
3.1.1-r0
3.1.2-r0
3.1.3-r0
3.1.4-r0
3.1.5-r0
3.1.5-r1
3.1.6-r1
3.1.7-r1
3.1.8-r1
3.1.9-r0
3.1.10-r0
3.1.11-r0
3.2.1-r0
3.2.1-r1
3.2.2-r1
3.2.3-r0
3.2.4-r0
3.2.4-r1
3.2.5-r0
3.2.6-r0
3.2.7-r0
3.2.8-r0
3.2.9-r0
3.2.10-r0
3.2.11-r0
3.2.12-r0
3.2.12.1-r0
3.3.1-r0
3.3.2-r0
3.3.4-r0
3.3.5-r0
3.3.6-r0
3.3.7-r0
3.3.7-r1
3.3.8-r0
3.3.9-r0
3.3.9-r1
3.3.10-r0
3.3.11-r0
3.3.12-r0
3.3.13-r0
3.3.14-r0
3.4.0-r0
3.4.1-r0
3.4.5-r0