MGASA-2016-0181

Source
https://advisories.mageia.org/MGASA-2016-0181.html
Import Source
https://advisories.mageia.org/MGASA-2016-0181.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2016-0181
Related
Published
2016-05-18T20:14:22Z
Modified
2016-05-18T20:06:23Z
Summary
Updated libksba packages fix security vulnerabilities
Details

Updated libksba packages fix security vulnerabilities:

An out-of-bounds read access in ksbadntostr() in libksba 1.3.3, due to an incomplete fix for CVE-2016-4356, could result in denial of service (CVE-2016-4574).

In liksba 1.3.3, the returned length of the object from ksbaberparsetl() (ti.length) was not always checked against the actual buffer length, thus leading to a read access after the end of the buffer, which could result in denial of service (CVE-2016-4579).

References
Credits

Affected packages

Mageia:5 / libksba

Package

Name
libksba
Purl
pkg:rpm/mageia/libksba?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.4-1.mga5

Ecosystem specific

{
    "section": "core"
}