- ------------------------------------------------------------------------- Debian Security Advisory DSA-3220-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso April 11, 2015 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libtasn1-3 CVE ID : CVE-2015-2806 Hanno Boeck discovered a stack-based buffer overflow in the asn1_der_decoding function in Libtasn1, a library to manage ASN.1 structures. A remote attacker could take advantage of this flaw to cause an application using the Libtasn1 library to crash, or potentially to execute arbitrary code. For the stable distribution (wheezy), this problem has been fixed in version 2.13-2+deb7u2. We recommend that you upgrade your libtasn1-3 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org