1
PublicDateAtUSN: 2014-06-05
2
Candidate: CVE-2014-3469
5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
6
https://usn.ubuntu.com/usn/usn-2294-1
8
The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU
9
Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of
10
service (NULL pointer dereference and crash) via a NULL value in an ivalue
15
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-3469
21
upstream_libtasn1-3: needs-triage
22
lucid_libtasn1-3: released (2.4-1ubuntu0.2)
23
precise_libtasn1-3: released (2.10-1ubuntu1.2)
24
saucy_libtasn1-3: ignored (reached end-of-life)
25
trusty_libtasn1-3: DNE
29
upstream: http://git.savannah.gnu.org/cgit/libtasn1.git/commit/lib/element.c?id=a8b3e14f84174e01755bfd1be5448fffce7c9ffa
30
upstream: http://git.savannah.gnu.org/cgit/libtasn1.git/commit/lib/element.c?id=3d6a02f19ff15a38dae9686033e37499b3968256
31
upstream: http://git.savannah.gnu.org/cgit/libtasn1.git/commit/lib/element.c?id=53958290ab731c8486531a3bdef54a933533579d
32
upstream_libtasn1-6: released (3.6)
34
precise_libtasn1-6: DNE
35
saucy_libtasn1-6: ignored (reached end-of-life)
36
trusty_libtasn1-6: released (3.4-3ubuntu0.1)
37
devel_libtasn1-6: not-affected (3.6-1)