First published: Mon Mar 30 2015(Updated: )
From <a href="http://lists.gnu.org/archive/html/help-libtasn1/2015-03/msg00002.html">http://lists.gnu.org/archive/html/help-libtasn1/2015-03/msg00002.html</a>: GNU Libtasn1 is a standalone library written in C for manipulating ASN.1 objects including DER/BER encoding/decoding. GNU Libtasn1 is used by GnuTLS to handle X.509 structures and by GNU Shishi to handle Kerberos V5 structures. * Noteworthy changes in release 4.4 (released 2015-03-29) [stable] - Corrected a two-byte stack overflow in asn1_der_decoding. Reported by Hanno Böck. Exact commit that fixes this: <a href="http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=4d4f992826a4962790ecd0cce6fbba4a415ce149">http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=4d4f992826a4962790ecd0cce6fbba4a415ce149</a> CVE request: <a href="http://seclists.org/oss-sec/2015/q1/1038">http://seclists.org/oss-sec/2015/q1/1038</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libtasn1 | <4.4 | 4.4 |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Debian | =7.0 | |
Fedora | =20 | |
Fedora | =21 | |
Fedora | =22 | |
Libtasn1 | <=4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2806 has a moderate severity rating due to potential vulnerabilities in the GNU Libtasn1 library.
To resolve CVE-2015-2806, upgrade GNU Libtasn1 to version 4.4 or later.
CVE-2015-2806 affects various versions of GNU Libtasn1, specifically up to version 4.3, along with several Linux distributions.
Yes, official patches can be found in the latest updates for the GNU Libtasn1 library in affected distributions.
The impact of CVE-2015-2806 could lead to potential denial of service attacks due to improper handling of input.