{"id":"USN-3183-2","summary":"gnutls26 vulnerability","details":"USN-3183-1 fixed CVE-2016-8610 in GnuTLS in Ubuntu 16.04 LTS and Ubuntu\n16.10. This update provides the corresponding update for Ubuntu 12.04 LTS\nand Ubuntu 14.04 LTS.\n\nOriginal advisory details:\n\n Stefan Buehler discovered that GnuTLS incorrectly verified the serial\n length of OCSP responses. A remote attacker could possibly use this issue\n to bypass certain certificate validation measures. This issue only applied\n to Ubuntu 16.04 LTS. (CVE-2016-7444)\n \n Shi Lei discovered that GnuTLS incorrectly handled certain warning alerts.\n A remote attacker could possibly use this issue to cause GnuTLS to hang,\n resulting in a denial of service. This issue has only been addressed in\n Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-8610)\n \n It was discovered that GnuTLS incorrectly decoded X.509 certificates with a\n Proxy Certificate Information extension. A remote attacker could use this\n issue to cause GnuTLS to crash, resulting in a denial of service, or\n possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS\n and Ubuntu 16.10. (CVE-2017-5334)\n \n It was discovered that GnuTLS incorrectly handled certain OpenPGP\n certificates. A remote attacker could possibly use this issue to cause\n GnuTLS to crash, resulting in a denial of service, or possibly execute\n arbitrary code. (CVE-2017-5335, CVE-2017-5336, CVE-2017-5337)\n","modified":"2026-04-22T09:31:47.773169Z","published":"2017-03-20T16:39:41Z","related":["UBUNTU-CVE-2016-8610"],"upstream":["CVE-2016-8610","UBUNTU-CVE-2016-8610"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3183-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-8610"}],"affected":[{"package":{"name":"gnutls26","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/gnutls26@2.12.23-12ubuntu2.7?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.12.23-12ubuntu2.7"}]}],"versions":["2.12.23-1ubuntu4","2.12.23-1ubuntu5","2.12.23-12ubuntu1","2.12.23-12ubuntu2","2.12.23-12ubuntu2.1","2.12.23-12ubuntu2.2","2.12.23-12ubuntu2.3","2.12.23-12ubuntu2.4","2.12.23-12ubuntu2.5","2.12.23-12ubuntu2.6"],"ecosystem_specific":{"binaries":[{"binary_version":"3.0.11+really2.12.23-12ubuntu2.7","binary_name":"gnutls-bin"},{"binary_version":"2.12.23-12ubuntu2.7","binary_name":"libgnutls-openssl27"},{"binary_version":"2.12.23-12ubuntu2.7","binary_name":"libgnutls26"},{"binary_version":"2.12.23-12ubuntu2.7","binary_name":"libgnutlsxx27"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2016-8610"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3183-2.json"}}],"schema_version":"1.7.5"}