Debian: DSA-3078-1: libksba security update
Debian: DSA-3078-1: libksba security update
An integer underflow flaw, leading to a heap-based buffer overflow, was found in the ksba_oid_to_str() function of libksba, an X.509 and CMS (PKCS#7) library. By using special crafted S/MIME messages or ECC based OpenPGP data, it is possible to create a buffer overflow, which could
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3078-1 This email address is being protected from spambots. You need JavaScript enabled to view it. https://www.debian.org/security/ Salvatore Bonaccorso November 27, 2014 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libksba CVE ID : CVE-2014-9087 Debian Bug : 770972 An integer underflow flaw, leading to a heap-based buffer overflow, was found in the ksba_oid_to_str() function of libksba, an X.509 and CMS (PKCS#7) library. By using special crafted S/MIME messages or ECC based OpenPGP data, it is possible to create a buffer overflow, which could cause an application using libksba to crash (denial of service), or potentially, execute arbitrary code. For the stable distribution (wheezy), this problem has been fixed in version 1.2.0-2+deb7u1. For the upcoming stable distribution (jessie), this problem has been fixed in version 1.3.2-1. For the unstable distribution (sid), this problem has been fixed in version 1.3.2-1. We recommend that you upgrade your libksba packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.