MGASA-2026-0007

Source
https://advisories.mageia.org/MGASA-2026-0007.html
Import Source
https://advisories.mageia.org/MGASA-2026-0007.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2026-0007
Related
  • CVE-2025-13151
Published
2026-01-12T18:42:22Z
Modified
2026-01-12T18:57:19.602488Z
Summary
Updated libtasn1 packages fix security vulnerability
Details

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1expendoctet_string. (CVE-2025-13151)

References
Credits

Affected packages

Mageia:9 / libtasn1

Package

Name
libtasn1
Purl
pkg:rpm/mageia/libtasn1?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.21.0-1.mga9

Ecosystem specific

{
    "section": "core"
}

Database specific

source

"https://advisories.mageia.org/MGASA-2026-0007.json"