First published: Tue Feb 07 2023(Updated: )
KSBA (pronounced Kasbah) is a library to make X.509 certificates as well as the CMS easily accessible by other applications. Both specifications are building blocks of S/MIME and TLS.<br>Security Fix(es):<br><li> libksba: integer overflow to code executiona (CVE-2022-47629)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libksba | <1.5.1-6.el9_0 | 1.5.1-6.el9_0 |
redhat/libksba | <1.5.1-6.el9_0 | 1.5.1-6.el9_0 |
redhat/libksba-debuginfo | <1.5.1-6.el9_0 | 1.5.1-6.el9_0 |
redhat/libksba-debuginfo | <1.5.1-6.el9_0 | 1.5.1-6.el9_0 |
redhat/libksba-debugsource | <1.5.1-6.el9_0 | 1.5.1-6.el9_0 |
redhat/libksba-debugsource | <1.5.1-6.el9_0 | 1.5.1-6.el9_0 |
redhat/libksba | <1.5.1-6.el9_0 | 1.5.1-6.el9_0 |
redhat/libksba-debuginfo | <1.5.1-6.el9_0 | 1.5.1-6.el9_0 |
redhat/libksba-debugsource | <1.5.1-6.el9_0 | 1.5.1-6.el9_0 |
redhat/libksba | <1.5.1-6.el9_0.aa | 1.5.1-6.el9_0.aa |
redhat/libksba-debuginfo | <1.5.1-6.el9_0.aa | 1.5.1-6.el9_0.aa |
redhat/libksba-debugsource | <1.5.1-6.el9_0.aa | 1.5.1-6.el9_0.aa |
redhat/libksba-devel | <1.5.1-6.el9_0 | 1.5.1-6.el9_0 |
redhat/libksba-devel | <1.5.1-6.el9_0 | 1.5.1-6.el9_0 |
redhat/libksba-devel | <1.5.1-6.el9_0 | 1.5.1-6.el9_0 |
redhat/libksba-devel | <1.5.1-6.el9_0.aa | 1.5.1-6.el9_0.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:0629 is classified as important.
You can fix RHSA-2023:0629 by updating libksba and its related packages to version 1.5.1-6.el9_0.
RHSA-2023:0629 addresses the CVE-2022-47629 vulnerability, which involves an integer overflow leading to code execution.
The affected packages include libksba, libksba-debuginfo, and libksba-devel among others.
Not addressing RHSA-2023:0629 may expose your system to potential code execution attacks due to the identified vulnerability.