[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 195-1] libtasn1-3 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : libtasn1-3
Version        : 2.7-1+squeeze+3
CVE ID         : CVE-2015-2806

Hanno Boeck discovered a stack-based buffer overflow in the
asn1_der_decoding function in Libtasn1, a library to manage ASN.1
structures. A remote attacker could take advantage of this flaw to cause
an application using the Libtasn1 library to crash, or potentially to
execute arbitrary code.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=CMa2
-----END PGP SIGNATURE-----


Reply to: