CVE-2009-1415
Publication date 30 April 2009
Last updated 24 July 2024
Ubuntu priority
lib/pk-libgcrypt.c in libgnutls in GnuTLS before 2.6.6 does not properly handle invalid DSA signatures, which allows remote attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a malformed DSA key that triggers a (1) free of an uninitialized pointer or (2) double free.
Status
Package | Ubuntu Release | Status |
---|---|---|
gnutls11 | 9.04 jaunty | Not in release |
8.10 intrepid | Not in release | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper |
Not affected
|
|
gnutls12 | 9.04 jaunty | Not in release |
8.10 intrepid | Not in release | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper |
Not affected
|
|
gnutls13 | 9.04 jaunty | Not in release |
8.10 intrepid | Not in release | |
8.04 LTS hardy |
Not affected
|
|
6.06 LTS dapper | Not in release | |
gnutls26 | 9.04 jaunty |
Not affected
|
8.10 intrepid |
Not affected
|
|
8.04 LTS hardy | Not in release | |
6.06 LTS dapper | Not in release |
Notes
jdstrand
from advisory: Only GnuTLS 2.6.x is affected. GnuTLS 2.4.x and earlier did not contain the buggy code.