Debian Security Advisory
DSA-3078-1 libksba -- security update
- Date Reported:
- 27 Nov 2014
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 770972.
In Mitre's CVE dictionary: CVE-2014-9087.
- More information:
An integer underflow flaw, leading to a heap-based buffer overflow, was found in the ksba_oid_to_str() function of libksba, an X.509 and CMS (PKCS#7) library. By using special crafted S/MIME messages or ECC based OpenPGP data, it is possible to create a buffer overflow, which could cause an application using libksba to crash (denial of service), or potentially, execute arbitrary code.
For the stable distribution (wheezy), this problem has been fixed in version 1.2.0-2+deb7u1.
For the upcoming stable distribution (jessie), this problem has been fixed in version 1.3.2-1.
For the unstable distribution (sid), this problem has been fixed in version 1.3.2-1.
We recommend that you upgrade your libksba packages.