Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2014-9087

Published: 26 November 2014

Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.

Notes

AuthorNote
mdeslaur
affects gnupg2 2.1 only

Priority

Medium

Status

Package Release Status
gnupg2
Launchpad, Ubuntu, Debian
lucid Not vulnerable

precise Not vulnerable

trusty Does not exist
(trusty was not-affected)
upstream Needs triage

utopic Not vulnerable

libksba
Launchpad, Ubuntu, Debian
lucid Ignored
(end of life)
precise
Released (1.2.0-2ubuntu0.1)
trusty
Released (1.3.0-3ubuntu0.14.04.1)
upstream
Released (1.3.2-1)
utopic
Released (1.3.0-3ubuntu0.14.10.1)
Patches:
upstream: http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=f715b9e156dfa99ae829fc694e5a0abd23ef97d7