MGASA-2015-0200

Source
https://advisories.mageia.org/MGASA-2015-0200.html
Import Source
https://advisories.mageia.org/MGASA-2015-0200.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0200
Related
Published
2015-05-06T17:44:06Z
Modified
2015-05-06T17:35:35Z
Summary
Updated libtasn1 packages fix CVE-2015-3622
Details

Updated libtasn1 packages fix security vulnerability:

A malformed certificate input could cause a heap overflow read in the DER decoding functions of Libtasn1. The heap overflow happens in the function asn1extractderoctet() (CVE-2015-3622).

References
Credits

Affected packages

Mageia:4 / libtasn1

Package

Name
libtasn1
Purl
pkg:rpm/mageia/libtasn1?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6-1.2.mga4

Ecosystem specific

{
    "section": "core"
}