First published: Tue Jan 17 2023(Updated: )
Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser. <a href="https://dev.gnupg.org/T6284">https://dev.gnupg.org/T6284</a> <a href="https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=f61a5ea4e0f6a80fd4b28ef0174bee77793cf070">https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libksba.git;a=commit;h=f61a5ea4e0f6a80fd4b28ef0174bee77793cf070</a> <a href="https://www.debian.org/security/2022/dsa-5305">https://www.debian.org/security/2022/dsa-5305</a> <a href="https://lists.debian.org/debian-lts-announce/2022/12/msg00035.html">https://lists.debian.org/debian-lts-announce/2022/12/msg00035.html</a> <a href="https://security.gentoo.org/glsa/202212-07">https://security.gentoo.org/glsa/202212-07</a>
Affected Software | Affected Version | How to fix |
---|---|---|
gnupg Libksba | <1.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2161571 is high due to the potential for integer overflow exploitation.
To fix REDHAT-BUG-2161571, update Libksba to version 1.6.3 or later.
Libksba versions prior to 1.6.3 are affected by REDHAT-BUG-2161571.
REDHAT-BUG-2161571 is classified as an integer overflow vulnerability in the CRL signature parser.
More information about REDHAT-BUG-2161571 can be found in the bug reports and commits related to Libksba.