Multiple vulnerabilities have been found in libksba which might allow remote attackers to obtain sensitive information or crash an libksba-based application.
| Package | dev-libs/libksba on all architectures | 
|---|---|
| Affected versions | < 1.3.5 | 
| Unaffected versions | >= 1.3.5 | 
Libksba is a X.509 and CMS (PKCS#7) library.
It was found that an unproportionate amount of memory is allocated when parsing crafted certificates in libskba, which may lead to Denial of Service condition.
Moreover in libksba 1.3.4, allocated memory is uninitialized and could potentially contain sensitive data left in freed memory block.
A remote attacker, able to interact with an libksba-based application, could possibly obtain sensitive information or cause a Denial of Service condition.
There is no known workaround at this time.
All libksba users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/libksba-1.3.5"
      Release date
      
      June 22, 2017
    
      Latest revision
      
      June 22, 2017: 1
    
      Severity
      
      normal
    
      Exploitable
      
      remote
    
Bugzilla entries