Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1207192 - (CVE-2015-2806) CVE-2015-2806 libtasn1: stack overflow in asn1_der_decoding
CVE-2015-2806 libtasn1: stack overflow in asn1_der_decoding
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20150326,reported=2...
: Security
Depends On: 1207193 1207194 1207195 1421361
Blocks: 1207196
  Show dependency treegraph
 
Reported: 2015-03-30 08:13 EDT by Vasyl Kaigorodov
Modified: 2018-07-18 10:37 EDT (History)
17 users (show)

See Also:
Fixed In Version: libtasn1 4.4
Doc Type: Bug Fix
Doc Text:
A stack-based buffer overflow was found in the way libtasn1 decoded certain DER encoded data. An attacker could use this flaw to crash an application using the libtasn1 library.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:1860 normal SHIPPED_LIVE Moderate: libtasn1 security, bug fix, and enhancement update 2017-08-01 13:50:00 EDT

  None (edit)
Description Vasyl Kaigorodov 2015-03-30 08:13:01 EDT
From http://lists.gnu.org/archive/html/help-libtasn1/2015-03/msg00002.html:

GNU Libtasn1 is a standalone library written in C for manipulating ASN.1
objects including DER/BER encoding/decoding.  GNU Libtasn1 is used by
GnuTLS to handle X.509 structures and by GNU Shishi to handle Kerberos
V5 structures.

* Noteworthy changes in release 4.4 (released 2015-03-29) [stable]
- Corrected a two-byte stack overflow in asn1_der_decoding. Reported
  by Hanno Böck.

Exact commit that fixes this:
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=4d4f992826a4962790ecd0cce6fbba4a415ce149

CVE request: http://seclists.org/oss-sec/2015/q1/1038
Comment 1 Vasyl Kaigorodov 2015-03-30 08:14:08 EDT
Created libtasn1 tracking bugs for this issue:

Affects: fedora-all [bug 1207193]
Comment 2 Vasyl Kaigorodov 2015-03-30 08:14:12 EDT
Created mingw-libtasn1 tracking bugs for this issue:

Affects: fedora-all [bug 1207194]
Affects: epel-all [bug 1207195]
Comment 3 Fedora Update System 2015-04-18 05:37:57 EDT
libtasn1-3.8-3.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 4 Fedora Update System 2015-04-18 05:47:33 EDT
libtasn1-4.4-1.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 5 Fedora Update System 2015-04-21 14:43:50 EDT
mingw-libtasn1-4.4-1.fc22, mingw-gnutls-3.3.14-1.fc22 has been pushed to the Fedora 22 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 6 Fedora Update System 2015-04-21 14:57:46 EDT
libtasn1-4.4-1.fc22 has been pushed to the Fedora 22 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 7 Fedora Update System 2015-04-21 15:12:36 EDT
mingw-libtasn1-3.8-2.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 8 Fedora Update System 2015-04-21 15:16:09 EDT
mingw-libtasn1-4.4-1.fc21, mingw-gnutls-3.3.14-1.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 9 Huzaifa S. Sidhpurwala 2015-06-02 00:39:26 EDT
Statement:

Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw in the libtasn1 packages.
Comment 12 errata-xmlrpc 2017-08-01 11:09:40 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1860 https://access.redhat.com/errata/RHSA-2017:1860

Note You need to log in before you can comment on or make changes to this bug.