First published: Mon Feb 06 2023(Updated: )
KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.<br>Security Fix(es):<br><li> libksba: integer overflow to code executiona (CVE-2022-47629)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libksba | <1.3.5-9.el8_6 | 1.3.5-9.el8_6 |
redhat/libksba | <1.3.5-9.el8_6 | 1.3.5-9.el8_6 |
redhat/libksba-debuginfo | <1.3.5-9.el8_6 | 1.3.5-9.el8_6 |
redhat/libksba-debuginfo | <1.3.5-9.el8_6 | 1.3.5-9.el8_6 |
redhat/libksba-debugsource | <1.3.5-9.el8_6 | 1.3.5-9.el8_6 |
redhat/libksba-debugsource | <1.3.5-9.el8_6 | 1.3.5-9.el8_6 |
redhat/libksba | <1.3.5-9.el8_6 | 1.3.5-9.el8_6 |
redhat/libksba-debuginfo | <1.3.5-9.el8_6 | 1.3.5-9.el8_6 |
redhat/libksba-debugsource | <1.3.5-9.el8_6 | 1.3.5-9.el8_6 |
redhat/libksba | <1.3.5-9.el8_6.aa | 1.3.5-9.el8_6.aa |
redhat/libksba-debuginfo | <1.3.5-9.el8_6.aa | 1.3.5-9.el8_6.aa |
redhat/libksba-debugsource | <1.3.5-9.el8_6.aa | 1.3.5-9.el8_6.aa |
redhat/libksba-devel | <1.3.5-9.el8_6 | 1.3.5-9.el8_6 |
redhat/libksba-devel | <1.3.5-9.el8_6 | 1.3.5-9.el8_6 |
redhat/libksba-devel | <1.3.5-9.el8_6 | 1.3.5-9.el8_6 |
redhat/libksba-devel | <1.3.5-9.el8_6.aa | 1.3.5-9.el8_6.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2023:0594 is classified as a security fix due to an integer overflow vulnerability.
To fix RHSA-2023:0594, you need to update to libksba version 1.3.5-9.el8_6 or later.
RHSA-2023:0594 affects various versions of the libksba package including libksba, libksba-debuginfo, and libksba-devel.
RHSA-2023:0594 addresses CVE-2022-47629, which is an integer overflow vulnerability that can lead to code execution.
There are no specific workarounds for RHSA-2023:0594; updating the affected packages is the primary recommendation.