First published: Tue Feb 07 2023(Updated: )
KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.<br>Security Fix(es):<br><li> libksba: integer overflow to code executiona (CVE-2022-47629)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libksba | <1.3.5-9.el8_4 | 1.3.5-9.el8_4 |
redhat/libksba | <1.3.5-9.el8_4 | 1.3.5-9.el8_4 |
redhat/libksba-debuginfo | <1.3.5-9.el8_4 | 1.3.5-9.el8_4 |
redhat/libksba-debuginfo | <1.3.5-9.el8_4 | 1.3.5-9.el8_4 |
redhat/libksba-debugsource | <1.3.5-9.el8_4 | 1.3.5-9.el8_4 |
redhat/libksba-debugsource | <1.3.5-9.el8_4 | 1.3.5-9.el8_4 |
redhat/libksba | <1.3.5-9.el8_4 | 1.3.5-9.el8_4 |
redhat/libksba-debuginfo | <1.3.5-9.el8_4 | 1.3.5-9.el8_4 |
redhat/libksba-debugsource | <1.3.5-9.el8_4 | 1.3.5-9.el8_4 |
redhat/libksba | <1.3.5-9.el8_4.aa | 1.3.5-9.el8_4.aa |
redhat/libksba-debuginfo | <1.3.5-9.el8_4.aa | 1.3.5-9.el8_4.aa |
redhat/libksba-debugsource | <1.3.5-9.el8_4.aa | 1.3.5-9.el8_4.aa |
redhat/libksba-devel | <1.3.5-9.el8_4 | 1.3.5-9.el8_4 |
redhat/libksba-devel | <1.3.5-9.el8_4 | 1.3.5-9.el8_4 |
redhat/libksba-devel | <1.3.5-9.el8_4 | 1.3.5-9.el8_4 |
redhat/libksba-devel | <1.3.5-9.el8_4.aa | 1.3.5-9.el8_4.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:0624 is classified as important.
To fix RHSA-2023:0624, update to the remedy version 1.3.5-9.el8_4 for the affected libksba packages.
RHSA-2023:0624 addresses an integer overflow vulnerability leading to code execution, identified as CVE-2022-47629.
Affected packages for RHSA-2023:0624 include libksba, libksba-debuginfo, and libksba-devel.
A system reboot may not be necessary after applying the fix for RHSA-2023:0624, but it’s recommended to verify application behaviors.