-
libtasn1-6 (3.4-3ubuntu0.6) trusty-security; urgency=medium
* SECURITY UPDATE: NULL pointer dereference and DoS
- debian/patches/CVE-2017-10790.patch: safer access to values
read in /lib/parser_aux.c.
- CVE-2017-10790
-- <email address hidden> (Leonidas S. Barbosa) Wed, 24 Jan 2018 16:37:09 -0300
-
libtasn1-6 (3.4-3ubuntu0.5) trusty-security; urgency=medium
* SECURITY UPDATE: buffer overflow via specially crafted assignments file
- debian/patches/CVE-2017-6891.patch: add checks to lib/parser_aux.c.
- CVE-2017-6891
-- Marc Deslauriers <email address hidden> Thu, 01 Jun 2017 13:15:06 -0400
-
libtasn1-6 (3.4-3ubuntu0.4) trusty-security; urgency=medium
* SECURITY UPDATE: infinite loop via malformed DER cert
- debian/patches/CVE-2016-4008-1.patch: catch invalid input cases early
in lib/decoding.c.
- debian/patches/CVE-2016-4008-2.patch: properly account bytes read in
lib/decoding.c.
- CVE-2016-4008
-- Marc Deslauriers <email address hidden> Tue, 26 Apr 2016 14:11:17 -0400
-
libtasn1-6 (3.4-3ubuntu0.3) trusty-security; urgency=medium
* SECURITY UPDATE: denial of service and possible code execution via
overflow in _asn1_extract_der_octet.
- debian/patches/CVE-2015-3622.patch: properly handle length in
lib/decoding.c.
- CVE-2015-3622
-- Marc Deslauriers <email address hidden> Fri, 01 May 2015 09:45:29 -0400
-
libtasn1-6 (3.4-3ubuntu0.2) trusty-security; urgency=medium
* SECURITY UPDATE: denial of service and possible code execution via
overflow in _asn1_ltostr
- debian/patches/CVE-2015-2806.patch: introduce LTOSTR_MAX_SIZE and use
in lib/coding.c, lib/decoding.c, lib/element.c, lib/parser_aux.c,
lib/parser_aux.h.
- CVE-2015-2806
-- Marc Deslauriers <email address hidden> Thu, 02 Apr 2015 11:12:05 -0400
-
libtasn1-6 (3.4-3ubuntu0.1) trusty-security; urgency=medium
* SECURITY UPDATE: denial of service and possible code execution via
invalid ASN.1 data
- debian/patches/CVE-2014-3467-3468.patch: properly calculate lengths
in lib/decoding.c.
- CVE-2014-3467
- CVE-2014-3468
* SECURITY UPDATE: denial of service via NULL value
- debian/patches/CVE-2014-3469.patch: check for NULLs in lib/element.c.
- CVE-2014-3469
-- Marc Deslauriers <email address hidden> Fri, 18 Jul 2014 11:49:24 -0400
-
libtasn1-6 (3.4-3) unstable; urgency=medium
* Point vcs* to git.
* Add debian/upstream-signing-key.pgp (listed in
debian/source/include-binaries) and update watchfile to check
upstream signature.
* Add transitional packages for libtasn1-3-dev and -bin. (#730856)
-- Andreas Metzler <email address hidden> Sat, 01 Feb 2014 11:39:30 +0100
-
libtasn1-6 (3.4-2) unstable; urgency=low
* Upload to unstable.
-- Andreas Metzler <email address hidden> Fri, 29 Nov 2013 18:46:13 +0100
-
libtasn1-6 (3.3-2) unstable; urgency=low
* Use debhelper v9 mode. This allows us to mark libtasn1-6-dbg Multi-Arch:
same.
* Point Vcs-* to anonscm.debian.org.
-- Andreas Metzler <email address hidden> Sun, 23 Jun 2013 15:14:02 +0200