| Summary: | libksba new integer overflow security issue | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/641765/ | ||
| Whiteboard: | has_procedure MGA4-32-OK advisory | ||
| Source RPM: | libksba-1.3.2-1.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-04-17 16:50:40 CEST
David Walser
2015-04-17 16:50:48 CEST
Whiteboard:
(none) =>
has_procedure Tested fine on Mageia 4 i586 using the first half of MrsB's previous procedure with gpg2. Whiteboard:
has_procedure =>
has_procedure MGA4-32-OK Validating. Advisory uploaded. Please push to 4 updates Thanks Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0166.html Status:
NEW =>
RESOLVED
David Walser
2015-04-24 16:37:49 CEST
URL:
(none) =>
http://lwn.net/Vulnerabilities/641765/ This update fixed CVE-2016-4354, CVE-2016-4355, and CVE-2016-4356: http://openwall.com/lists/oss-security/2016/04/29/8 |