Bugzilla – Bug 982779
VUL-0: CVE-2016-4008: libtasn1: infinite loop while parsing DER certificates
Last modified: 2020-09-24 12:23:13 UTC
rh#1325965 The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. References: https://bugzilla.redhat.com/show_bug.cgi?id=1325965 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4008 http://www.openwall.com/lists/oss-security/2016/04/11/3 http://seclists.org/oss-sec/2016/q2/66 http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-4008.html http://www.debian.org/security/2016/dsa-3568 http://www.cvedetails.com/cve/CVE-2016-4008/ http://www.ubuntu.com/usn/USN-2957-1 http://www.ubuntu.com/usn/USN-2957-2 http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625 https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html
Hi Marcus Why was this bug assigned to us GNOME folks?
in suse the package is maintained by the GNOME group. externally it is apparently me :/
bugbot adjusting priority
sles submitted today, opensuse next week
This is an autogenerated message for OBS integration: This bug (982779) was mentioned in https://build.opensuse.org/request/show/399983 13.2 / libtasn1
openszuse 13.2 submitted, 42.1 will come from sles 12. factory is already updated, added references. gnutls: needs checking
sle12 gnutls - uses external libtasn1. sle11 gnutls - uses internal libtasn1 ... might be affected, but the code looks quite different :/
openSUSE-SU-2016:1567-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 929414,961491,982779 CVE References: CVE-2015-3622,CVE-2016-4008 Sources used: openSUSE 13.2 (src): libtasn1-3.7-2.7.1
SUSE-SU-2016:1600-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 929414,961491,982779 CVE References: CVE-2015-3622,CVE-2016-4008 Sources used: SUSE Linux Enterprise Software Development Kit 11-SP4 (src): libtasn1-1.5-1.34.1 SUSE Linux Enterprise Server 11-SP4 (src): libtasn1-1.5-1.34.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): libtasn1-1.5-1.34.1
SUSE-SU-2016:1601-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 929414,961491,982779 CVE References: CVE-2015-3622,CVE-2016-4008 Sources used: SUSE Linux Enterprise Software Development Kit 12-SP1 (src): libtasn1-3.7-11.1 SUSE Linux Enterprise Software Development Kit 12 (src): libtasn1-3.7-11.1 SUSE Linux Enterprise Server 12-SP1 (src): libtasn1-3.7-11.1 SUSE Linux Enterprise Server 12 (src): libtasn1-3.7-11.1 SUSE Linux Enterprise Desktop 12-SP1 (src): libtasn1-3.7-11.1 SUSE Linux Enterprise Desktop 12 (src): libtasn1-3.7-11.1
openSUSE-SU-2016:1674-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 929414,961491,982779 CVE References: CVE-2015-3622,CVE-2016-4008 Sources used: openSUSE Leap 42.1 (src): libtasn1-3.7-12.1
Released.