CVE-2006-7239
Publication date 24 May 2010
Last updated 24 July 2024
Ubuntu priority
The _gnutls_x509_oid2mac_algorithm function in lib/gnutls_algorithms.c in GnuTLS before 1.4.2 allows remote attackers to cause a denial of service (crash) via a crafted X.509 certificate that uses a hash algorithm that is not supported by GnuTLS, which triggers a NULL pointer dereference.
Status
Package | Ubuntu Release | Status |
---|---|---|
gnutls11 | 10.04 LTS lucid | Not in release |
9.10 karmic | Not in release | |
9.04 jaunty | Not in release | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper |
Not affected
|
|
gnutls12 | 10.04 LTS lucid | Not in release |
9.10 karmic | Not in release | |
9.04 jaunty | Not in release | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper |
Fixed 1.2.9-2ubuntu1.8
|
|
gnutls13 | 10.04 LTS lucid | Not in release |
9.10 karmic | Not in release | |
9.04 jaunty | Not in release | |
8.04 LTS hardy |
Not affected
|
|
6.06 LTS dapper | Not in release | |
gnutls26 | 10.04 LTS lucid |
Not affected
|
9.10 karmic |
Not affected
|
|
9.04 jaunty |
Not affected
|
|
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release |
Notes
jdstrand
gnutls11 doesn’t have the affected code: _gnutls_x509_oid2mac_algorithm located in lib/x509/common.c which compares to #defines from x509.h, not a pointer Hardy (gnutls13) and higher already have the corrected code
References
Related Ubuntu Security Notices (USN)
- USN-948-1
- GnuTLS vulnerability
- 3 June 2010