– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201604-04
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Severity: Normal
Title: libksba: Multiple vulnerabilities
Date: April 26, 2016
Bugs: #546464
ID: 201604-04
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Synopsis
========
Multiple vulnerabilities have been found in libksba, allowing a
possible Denial of Service and unspecified other vectors through
integer overflows.
Background
==========
Libksba is a X.509 and CMS (PKCS#7) library.
Affected packages
=================
——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 dev-libs/libksba < 1.3.3 >= 1.3.3
Description
===========
libksba is vulnerable to two integer overflows and a Denial of Service
vulnerability. Please read the references for additional details.
Impact
======
Remote attackers could cause Denial of Service or unspecified other
vectors through various integer overflows.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All libksba users should upgrade to the latest version:
# emerge –sync
# emerge –ask –oneshot –verbose “>=dev-libs/libksba-1.3.3”
References
==========
[ 1 ] Denial of Service due to stack overflow in src/ber-decoder.c
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=07116a314f4dcd4d96990bbd74db95a03a9f650a
[ 2 ] Integer overflow in the BER decoder src/ber-decoder.c
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=aea7b6032865740478ca4b706850a5217f1c3887
[ 3 ] Integer overflow in the DN decoder src/dn.c
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=243d12fdec66a4360fbb3e307a046b39b5b4ffc3
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201604-04
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
—–BEGIN PGP SIGNATURE—–
iQEcBAEBCgAGBQJXH9xAAAoJECULev7WN52FyZMIAI6h2wUL0GFEEgSVa+Mzwf7A
yPlR+XQS+m8mfVVpffXKP7GhgCD8u9of/uZ7lSYRPIAcorV0+7L5JiBZUKTCuslj
BgYGdpeOidPtMv4+GQeGq9YItx1U4yTZnDB97E0r2hOvBZBDzPMk/3Sgc0hJ8KUr
m7Rt0Da5G5T0bQHGW6g5HnlpSgXOr5Cio0VeO7oGFsw1v/VBtY7UMZD/FckfbSwK
3ww8qlvr1Lti57BwseOCio44KGLpDl9tr3vV74KNsO3Yal+sG63rRCbOrmFneBlS
VJPp6gZ3jWqxa3Zcz1jej1ORu/oslz9umYpntUr1ZGCIBPlYhMRBYQE9n9MvPu0=
=xYDU
—–END PGP SIGNATURE—–