Gentoo: GLSA-201604-04: libksba: Multiple vulnerabilities
Summary
libksba is vulnerable to two integer overflows and a Denial of Service vulnerability. Please read the references for additional details.
Resolution
All libksba users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/libksba-1.3.3"
References
[ 1 ] Denial of Service due to stack overflow in src/ber-decoder.c
https://git.gnupg.org/;a=commit;h=07116a314f4dcd4d96990bbd74db95a03a9f650a
[ 2 ] Integer overflow in the BER decoder src/ber-decoder.c
https://git.gnupg.org/;a=commit;h=aea7b6032865740478ca4b706850a5217f1c3887
[ 3 ] Integer overflow in the DN decoder src/dn.c
https://git.gnupg.org/;a=commit;h=243d12fdec66a4360fbb3e307a046b39b5b4ffc3
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201604-04
Concerns
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
Synopsis
Multiple vulnerabilities have been found in libksba, allowing a possible Denial of Service and unspecified other vectors through integer overflows.
Background
Libksba is a X.509 and CMS (PKCS#7) library.
Affected Packages
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-libs/libksba < 1.3.3 >= 1.3.3
Impact
===== Remote attackers could cause Denial of Service or unspecified other vectors through various integer overflows.
Workaround
There is no known workaround at this time.