The asn1getbit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "libtasn1-3-bin", "binary_version": "3.4-3ubuntu0.1" }, { "binary_name": "libtasn1-3-dev", "binary_version": "3.4-3ubuntu0.1" }, { "binary_name": "libtasn1-6", "binary_version": "3.4-3ubuntu0.1" }, { "binary_name": "libtasn1-6-dbg", "binary_version": "3.4-3ubuntu0.1" }, { "binary_name": "libtasn1-6-dev", "binary_version": "3.4-3ubuntu0.1" }, { "binary_name": "libtasn1-bin", "binary_version": "3.4-3ubuntu0.1" } ] }