libtasn1.so is vulnerable to denial of service. The _asn1_extract_der_octet
function in lib/decoding.c
is affected by an out-of-bounds heap overflow read of 99 bytes which allows remote attackers to cause a denial of service via a crafted certificate.
lists.fedoraproject.org/pipermail/package-announce/2015-May/158225.html
lists.fedoraproject.org/pipermail/package-announce/2015-May/158225.html
lists.opensuse.org/opensuse-updates/2015-08/msg00014.html
lists.opensuse.org/opensuse-updates/2015-08/msg00014.html
lists.opensuse.org/opensuse-updates/2016-06/msg00047.html
lists.opensuse.org/opensuse-updates/2016-06/msg00047.html
lists.opensuse.org/opensuse-updates/2016-06/msg00097.html
lists.opensuse.org/opensuse-updates/2016-06/msg00097.html
packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html
packetstormsecurity.com/files/131711/libtasn1-Heap-Overflow.html
seclists.org/fulldisclosure/2015/Apr/109
seclists.org/fulldisclosure/2015/Apr/109
www.debian.org/security/2015/dsa-3256
www.debian.org/security/2015/dsa-3256
www.mandriva.com/security/advisories?name=MDVSA-2015:232
www.mandriva.com/security/advisories?name=MDVSA-2015:232
www.securityfocus.com/bid/74419
www.securityfocus.com/bid/74419
www.securitytracker.com/id/1032246
www.securitytracker.com/id/1032246
www.ubuntu.com/usn/USN-2604-1
www.ubuntu.com/usn/USN-2604-1
access.redhat.com/errata/RHSA-2017:1860
access.redhat.com/errata/RHSA-2017:1860
github.com/gnutls/libtasn1/commit/f979435823a02f842c41d49cd41cc81f25b5d677
lists.gnu.org/archive/html/help-libtasn1/2015-04/msg00000.html
lists.gnu.org/archive/html/help-libtasn1/2015-04/msg00000.html
security.gentoo.org/glsa/201509-04
security.gentoo.org/glsa/201509-04