CVE-2014-3469
Published: 5 June 2014
The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
Priority
Status
Package | Release | Status |
---|---|---|
libtasn1-3 Launchpad, Ubuntu, Debian |
lucid |
Released
(2.4-1ubuntu0.2)
|
precise |
Released
(2.10-1ubuntu1.2)
|
|
saucy |
Ignored
(reached end-of-life)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
libtasn1-6 Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Does not exist
|
|
saucy |
Ignored
(reached end-of-life)
|
|
trusty |
Released
(3.4-3ubuntu0.1)
|
|
upstream |
Released
(3.6)
|
|
Patches: upstream: http://git.savannah.gnu.org/cgit/libtasn1.git/commit/lib/element.c?id=a8b3e14f84174e01755bfd1be5448fffce7c9ffa upstream: http://git.savannah.gnu.org/cgit/libtasn1.git/commit/lib/element.c?id=3d6a02f19ff15a38dae9686033e37499b3968256 upstream: http://git.savannah.gnu.org/cgit/libtasn1.git/commit/lib/element.c?id=53958290ab731c8486531a3bdef54a933533579d |