[USN-2982-1] Libksba vulnerabilities
Marc Deslauriers
marc.deslauriers at canonical.com
Tue May 17 15:35:31 UTC 2016
==========================================================================
Ubuntu Security Notice USN-2982-1
May 17, 2016
libksba vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Libksba could be made to crash or run programs if it decoded specially
crafted data.
Software Description:
- libksba: X.509 and CMS support library
Details:
Hanno Böck discovered that Libksba incorrectly handled decoding certain BER
data. An attacker could use this issue to cause Libksba to crash, resulting
in a denial of service. This issue only applied to Ubuntu 12.04 LTS and
Ubuntu 14.04 LTS. (CVE-2016-4353)
Hanno Böck discovered that Libksba incorrectly handled decoding certain BER
data. An attacker could use this issue to cause Libksba to crash, resulting
in a denial of service, or possibly execute arbitrary code. This issue only
applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2016-4354,
CVE-2016-4355)
Hanno Böck discovered that Libksba incorrectly handled incorrect utf-8
strings when decoding certain DN data. An attacker could use this issue to
cause Libksba to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only applied to Ubuntu 12.04 LTS and
Ubuntu 14.04 LTS. (CVE-2016-4356)
Pascal Cuoq discovered that Libksba incorrectly handled incorrect utf-8
strings when decoding certain DN data. An attacker could use this issue to
cause Libksba to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2016-4574)
Pascal Cuoq discovered that Libksba incorrectly handled decoding certain
data. An attacker could use this issue to cause Libksba to crash, resulting
in a denial of service. (CVE-2016-4579)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 LTS:
libksba8 1.3.3-1ubuntu0.16.04.1
Ubuntu 15.10:
libksba8 1.3.3-1ubuntu0.15.10.1
Ubuntu 14.04 LTS:
libksba8 1.3.0-3ubuntu0.14.04.2
Ubuntu 12.04 LTS:
libksba8 1.2.0-2ubuntu0.2
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2982-1
CVE-2016-4353, CVE-2016-4354, CVE-2016-4355, CVE-2016-4356,
CVE-2016-4574, CVE-2016-4579
Package Information:
https://launchpad.net/ubuntu/+source/libksba/1.3.3-1ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/libksba/1.3.3-1ubuntu0.15.10.1
https://launchpad.net/ubuntu/+source/libksba/1.3.0-3ubuntu0.14.04.2
https://launchpad.net/ubuntu/+source/libksba/1.2.0-2ubuntu0.2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20160517/42712fb1/attachment.sig>
More information about the ubuntu-security-announce
mailing list