CVE-2015-2806

Publication date 1 April 2015

Last updated 24 July 2024


Ubuntu priority

Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.

Read the notes from the security team

Status

Package Ubuntu Release Status
libtasn1-3 14.10 utopic Not in release
14.04 LTS trusty Not in release
12.04 LTS precise
Fixed 2.10-1ubuntu1.3
10.04 LTS lucid
Fixed 2.4-1ubuntu0.3
libtasn1-6 14.10 utopic
Fixed 4.0-2ubuntu0.1
14.04 LTS trusty
Fixed 3.4-3ubuntu0.2
12.04 LTS precise Not in release
10.04 LTS lucid Not in release

Notes


tyhicks

In Precise and older, it may make sense to just do the one-line change of increasing the temp array to 22 bytes. More investigation needed.

References

Related Ubuntu Security Notices (USN)

Other references