Bug 1211260 (CVE-2016-4354, CVE-2016-4355)
Summary: | CVE-2016-4354 CVE-2016-4355 libksba: integer overflow in the BER decoder src/ber-decoder.c (ber_decoder_s) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | carnil, rdieter |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | libksba 1.3.3 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2021-06-11 21:03:59 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1211263 | ||
Bug Blocks: | 1211262 |
Description
Vasyl Kaigorodov
2015-04-13 13:06:14 UTC
Created libksba tracking bugs for this issue: Affects: fedora-all [bug 1211263] Statement: Red Hat Product Security has rated this issue as having moderate security impact, a future update may address this flaw in libksba. CVE assignments: http://seclists.org/oss-sec/2016/q2/172 Descriptions: Use CVE-2016-4354 for the use of an incorrect integer data type. Use CVE-2016-4355 for the cases in which the code was simply making no attempt to check for an integer overflow (the "+ 100" cases and the "+= d->val.length" case). This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2016-4354 https://access.redhat.com/security/cve/cve-2016-4355 |