Change logs for libtasn1-3 source package in Precise

  • libtasn1-3 (2.10-1ubuntu1.6) precise-security; urgency=medium
    
      [ Marc Deslauriers ]
      * SECURITY UPDATE: buffer overflow via specially crafted assignments file
        - debian/patches/CVE-2017-6891.patch: add checks lib/parser_aux.c.
        - CVE-2017-6891
    
     -- <email address hidden> (Leonidas S. Barbosa)  Tue, 11 Jul 2017 11:23:44 -0300
  • libtasn1-3 (2.10-1ubuntu1.5) precise-security; urgency=medium
    
      * SECURITY UPDATE: infinite loop via malformed DER cert
        - debian/patches/CVE-2016-4008-1.patch: catch invalid input cases early
          in lib/decoding.c.
        - debian/patches/CVE-2016-4008-2.patch: properly account bytes read in
          lib/decoding.c.
        - CVE-2016-4008
    
     -- Marc Deslauriers <email address hidden>  Tue, 26 Apr 2016 14:20:41 -0400
  • libtasn1-3 (2.10-1ubuntu1.4) precise-security; urgency=medium
    
      * SECURITY UPDATE: denial of service and possible code execution via
        overflow in _asn1_extract_der_octet.
        - debian/patches/CVE-2015-3622.patch: properly handle length in
          lib/decoding.c.
        - CVE-2015-3622
    
     -- Marc Deslauriers <email address hidden>  Fri, 01 May 2015 09:46:08 -0400
  • libtasn1-3 (2.10-1ubuntu1.3) precise-security; urgency=medium
    
      * SECURITY UPDATE: denial of service and possible code execution via
        overflow in _asn1_ltostr
        - debian/patches/CVE-2015-2806.patch: introduce LTOSTR_MAX_SIZE and use
          in lib/coding.c, lib/decoding.c, lib/element.c, lib/parser_aux.c,
          lib/parser_aux.h.
        - CVE-2015-2806
     -- Marc Deslauriers <email address hidden>   Thu, 02 Apr 2015 11:22:00 -0400
  • libtasn1-3 (2.10-1ubuntu1.2) precise-security; urgency=medium
    
      * SECURITY UPDATE: denial of service and possible code execution via
        invalid ASN.1 data
        - debian/patches/CVE-2014-3467-3468.patch: properly calculate lengths
          in lib/decoding.c.
        - CVE-2014-3467
        - CVE-2014-3468
      * SECURITY UPDATE: denial of service via NULL value
        - debian/patches/CVE-2014-3469.patch: check for NULLs in lib/element.c.
        - CVE-2014-3469
     -- Marc Deslauriers <email address hidden>   Fri, 18 Jul 2014 13:36:06 -0400
  • libtasn1-3 (2.10-1ubuntu1.1) precise-security; urgency=low
    
      * SECURITY UPDATE: denial of service and possible code execution via
        certain large length values.
        - debian/patches/CVE-2012-1569.diff: return an error when the decoded
          length value plus @len would exceed @der_len in lib/decoding.c.
        - CVE-2012-1569
     -- Marc Deslauriers <email address hidden>   Tue, 24 Apr 2012 14:01:18 -0400
  • libtasn1-3 (2.10-1ubuntu1) precise; urgency=low
    
      * debian/rules: Disable compression of NEWS file for now to unbreak
        upgrades. Debugging the underlying gzip bug is quite hard and will take
        more time than a few hours. (LP: #889303)
     -- Martin Pitt <email address hidden>   Mon, 14 Nov 2011 08:59:19 +0100
  • libtasn1-3 (2.10-1build1) precise; urgency=low
    
      * No-change rebuild to (hopefully) fix unreproducible broken NEWS.gz on
        amd64. (LP: #889303)
     -- Martin Pitt <email address hidden>   Mon, 14 Nov 2011 08:41:08 +0100
  • libtasn1-3 (2.10-1) unstable; urgency=low
    
      [Simon Josefsson]
      * Fix Debian BTS URL in --with-packager-bug-reports option.
    
      [Andreas Metzler]
      * New upstream Version. (Includes workaround for #639818)
      * Point watchfile to ftp.gnu.org instead of ftp.gnutls.org.
      * [debian/control] Drop priority and section from libtasn1-3 binary package
        stanza.
      * Update debian/copyright.
     -- Ubuntu Archive Auto-Sync <email address hidden>   Fri,  11 Nov 2011 09:26:41 +0000
  • libtasn1-3 (2.9-4) unstable; urgency=low
    
      * Merge from Ubuntu (build for multiarch):
        + configure with --libdir=\$${prefix}/lib/$(DEB_HOST_MULTIARCH), update
          *.install accordingly.
        + Bump cdbs Build-Depends to 0.4.93 (required for expanding 
          $(DEB_HOST_MULTIARCH)).
        + Bump debhelper b-d to 8.1.3 (for ${misc:Pre-Depends}).
        + runtime library is Multi-Arch: same and has Pre-Depends: 
          ${misc:Pre-Depends}, -bin (helper binaries)
          is Multi-Arch: foreign. -dev is unchanged.
       * Diverge from the Ubuntu patch by not settting Multi-Arch: same on
         -dbg package. It contains debugging symbols for both library and helper
         binaries ( e.g. /usr/lib/debug/usr/bin/asn1Decoding) and is therefore not
         co-installable with itself.
     -- Steve Langasek <email address hidden>   Mon,  20 Jun 2011 22:26:11 +0000