Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2014-3469

Published: 5 June 2014

The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.

Priority

Medium

Status

Package Release Status
libtasn1-3
Launchpad, Ubuntu, Debian
lucid
Released (2.4-1ubuntu0.2)
precise
Released (2.10-1ubuntu1.2)
saucy Ignored
(end of life)
trusty Does not exist

upstream Needs triage

libtasn1-6
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

saucy Ignored
(end of life)
trusty
Released (3.4-3ubuntu0.1)
upstream
Released (3.6)
Patches:
upstream: http://git.savannah.gnu.org/cgit/libtasn1.git/commit/lib/element.c?id=a8b3e14f84174e01755bfd1be5448fffce7c9ffa
upstream: http://git.savannah.gnu.org/cgit/libtasn1.git/commit/lib/element.c?id=3d6a02f19ff15a38dae9686033e37499b3968256
upstream: http://git.savannah.gnu.org/cgit/libtasn1.git/commit/lib/element.c?id=53958290ab731c8486531a3bdef54a933533579d