Summary: | <dev-libs/libtasn1-3.6: Multiple vulnerabilities (CVE-2014-{3467,3468,3469}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Lars Wendler (Polynomial-C) (RETIRED) <polynomial-c> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | alonbl, crypto+disabled, k_f |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://lists.gnu.org/archive/html/help-libtasn1/2014-05/msg00006.html | ||
Whiteboard: | A3 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Lars Wendler (Polynomial-C) (RETIRED)
2014-05-26 11:54:42 UTC
Related CVEs for this version: CVE-2014-3467 libtasn1: multiple boundary check issues CVE-2014-3468 libtasn1: asn1_get_bit_der() can return negative bit length And also CVE-2014-3469 libtasn1: asn1_read_value_type() NULL pointer dereference See also: https://bugzilla.redhat.com/show_bug.cgi?id=1102022 https://bugzilla.redhat.com/show_bug.cgi?id=1102323 https://bugzilla.redhat.com/show_bug.cgi?id=1102329 libtasn1-3.6 in tree. thanks! Maintainers, please advise when eBuilds have had enough testing, and are ready for stabilization. (In reply to Yury German from comment #4) > Maintainers, please advise when eBuilds have had enough testing, and are > ready for stabilization. no problems reported so far, so I think we can progress. Thanks, Arches please stabilize: =dev-libs/libtasn1-3.6 Targets: alpha amd64 arm arm64 hppa ia64 ppc ppc64 sparc x86 amd64 stable Stable for HPPA. arm stable Stable on alpha. CVE-2014-3469 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3469): The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument. CVE-2014-3468 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3468): The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data. CVE-2014-3467 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3467): Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnutTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via a crafted ASN.1 data. x86 stable ia64 stable ppc64 stable ppc stable sparc stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. We already have a GLSA draft for this. Cleanup done by alonbl. This issue was resolved and addressed in GLSA 201408-09 at http://security.gentoo.org/glsa/glsa-201408-09.xml by GLSA coordinator Kristian Fiskerstrand (K_F). |