CVE-2016-7444 log

Source
Severity Medium
Remote Yes
Type Certificate verification bypass
Description
Incorrect length validation on gnutls's gnutls_ocsp_resp_check_crt method can allow an attacker to use a OCSP response for a different certificate (but from the same CA) to continue using a revoked certificate. This can happen if the serial from the revoked certificate is a prefix of the other one, and the additional bytes happen to be equal on the system doing the verification.
Group Package Affected Fixed Severity Status Ticket
AVG-26 gnutls 3.4.14-1 3.4.15-1 Medium Fixed
AVG-17 lib32-gnutls 3.4.14-1 3.4.15-1 Medium Fixed
Date Advisory Group Package Severity Type
26 Sep 2016 ASA-201609-26 AVG-17 lib32-gnutls Medium certificate verification bypass
26 Sep 2016 ASA-201609-25 AVG-26 gnutls Medium certificate verification bypass
References
https://gitlab.com/gnutls/gnutls/commit/964632f37dfdfb914ebc5e49db4fa29af35b1de9
https://lists.gnupg.org/pipermail/gnutls-devel/2016-September/008146.html