Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2014-3469

Published: 5 June 2014

The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.

Priority

Medium

Status

Package Release Status
libtasn1-3
Launchpad, Ubuntu, Debian
lucid
Released (2.4-1ubuntu0.2)
precise
Released (2.10-1ubuntu1.2)
saucy Ignored
(reached end-of-life)
trusty Does not exist

upstream Needs triage

libtasn1-6
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

saucy Ignored
(reached end-of-life)
trusty
Released (3.4-3ubuntu0.1)
upstream
Released (3.6)
Patches:
upstream: http://git.savannah.gnu.org/cgit/libtasn1.git/commit/lib/element.c?id=a8b3e14f84174e01755bfd1be5448fffce7c9ffa
upstream: http://git.savannah.gnu.org/cgit/libtasn1.git/commit/lib/element.c?id=3d6a02f19ff15a38dae9686033e37499b3968256
upstream: http://git.savannah.gnu.org/cgit/libtasn1.git/commit/lib/element.c?id=53958290ab731c8486531a3bdef54a933533579d