Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors (CVE-2015-2806) Original report says: "This is only in the asn1 definition parser, not in the asn1 parser itself, so the impact is probably minor." Note: GNU Libtasn1 is used by GnuTLS to handle X.509 structures.
imported libtasn1-3 2.13-2+deb7u2 from wheezy and built in errata4.0-3. YAML: 2015-09-11-libtasn1-3.yaml
OK: DEBIAN_FRONTEND=noninteractive apt-get install -y libtasn1-3 OK: /usr/share/doc/libtasn1-3/changelog.Debian.gz OK: r63391 / 2015-09-11-libtasn1-3.yaml / CVE… OK: Test: wget --secure-protocol=TLSv1 --ca-certificate=/etc/univention/ssl/ucsCA/CAcert.pem https://$(hostname -f)/ -O /dev/null &>/dev/null && echo OK
<http://errata.software-univention.de/ucs/4.0/332.html>