Multiple vulnerabilities have been found in libksba which might allow remote attackers to obtain sensitive information or crash an libksba-based application.
Package | dev-libs/libksba on all architectures |
---|---|
Affected versions | < 1.3.5 |
Unaffected versions | >= 1.3.5 |
Libksba is a X.509 and CMS (PKCS#7) library.
It was found that an unproportionate amount of memory is allocated when parsing crafted certificates in libskba, which may lead to Denial of Service condition.
Moreover in libksba 1.3.4, allocated memory is uninitialized and could potentially contain sensitive data left in freed memory block.
A remote attacker, able to interact with an libksba-based application, could possibly obtain sensitive information or cause a Denial of Service condition.
There is no known workaround at this time.
All libksba users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/libksba-1.3.5"
Release date
June 22, 2017
Latest revision
June 22, 2017: 1
Severity
normal
Exploitable
remote
Bugzilla entries