Bug 37035 - libksba: Buffer overflow (4.0)
libksba: Buffer overflow (4.0)
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.0
Other Linux
: P3 normal (vote)
: UCS 4.0-0-errata
Assigned To: Janek Walkenhorst
Moritz Muehlenhoff
Depends on:
  Show dependency treegraph
Reported: 2014-11-26 10:01 CET by Moritz Muehlenhoff
Modified: 2017-10-26 13:54 CEST (History)
0 users

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2014-11-26 10:01:50 CET
+++ This bug was initially created as a clone of Bug #37034 +++

libksba is used by gnupg2 to process S/MIME. A buffer overflow has been found in the ksba_oid_to_str() function (CVE-2014-9087)
Comment 1 Janek Walkenhorst univentionstaff 2015-01-09 17:57:01 CET
Version from wheezy-security imported.
Tests: OK
Advisory: 2015-01-09-libksba.yaml
Comment 2 Moritz Muehlenhoff univentionstaff 2015-01-12 09:06:31 CET
Update ok, YAML file ok.
Comment 3 Moritz Muehlenhoff univentionstaff 2015-01-13 11:27:10 CET