Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2009-1415

Published: 30 April 2009

lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key that triggers a (1) free of an uninitialized pointer or (2) double free.

Notes

AuthorNote
jdstrand
from advisory: Only GnuTLS 2.6.x is affected.  GnuTLS 2.4.x and earlier did not
contain the buggy code.

Priority

Medium

Status

Package Release Status
gnutls11
Launchpad, Ubuntu, Debian
upstream Needs triage

dapper Not vulnerable

hardy Does not exist

intrepid Does not exist

jaunty Does not exist

karmic Does not exist

gnutls12
Launchpad, Ubuntu, Debian
upstream Needs triage

dapper Not vulnerable

hardy Does not exist

intrepid Does not exist

jaunty Does not exist

karmic Does not exist

gnutls13
Launchpad, Ubuntu, Debian
upstream Needs triage

dapper Does not exist

hardy Not vulnerable

intrepid Does not exist

jaunty Does not exist

karmic Does not exist

gnutls26
Launchpad, Ubuntu, Debian
upstream
Released (2.6.6)
dapper Does not exist

hardy Does not exist

intrepid Not vulnerable

jaunty Not vulnerable

karmic Not vulnerable
(2.6.6-1)