rpm package
opensuse/libtasn1&distro=openSUSE Tumbleweed
pkg:rpm/opensuse/libtasn1&distro=openSUSE%20Tumbleweed
Vulnerabilities (10)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-13151 | — | < 4.21.0-1.1 | 4.21.0-1.1 | Jan 7, 2026 | Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string. | ||
| CVE-2024-12133 | Med | 5.3 | < 4.20.0-1.1 | 4.20.0-1.1 | Feb 10, 2025 | A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially craft | |
| CVE-2018-1000654 | — | < 4.17.0-1.2 | 4.17.0-1.2 | Aug 20, 2018 | GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears | ||
| CVE-2018-6003 | — | < 4.17.0-1.2 | 4.17.0-1.2 | Jan 22, 2018 | An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS. | ||
| CVE-2016-4008 | Med | 5.9 | < 4.9-1.3 | 4.9-1.3 | May 5, 2016 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. | |
| CVE-2015-3622 | — | < 4.9-1.3 | 4.9-1.3 | May 12, 2015 | The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate. | ||
| CVE-2015-2806 | — | < 4.9-1.3 | 4.9-1.3 | Apr 10, 2015 | Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors. | ||
| CVE-2014-3469 | — | < 4.9-1.3 | 4.9-1.3 | Jun 5, 2014 | The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument. | ||
| CVE-2014-3468 | — | < 4.9-1.3 | 4.9-1.3 | Jun 5, 2014 | The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data. | ||
| CVE-2014-3467 | — | < 4.9-1.3 | 4.9-1.3 | Jun 5, 2014 | Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data. |
- CVE-2025-13151Jan 7, 2026affected < 4.21.0-1.1fixed 4.21.0-1.1
Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.
- affected < 4.20.0-1.1fixed 4.20.0-1.1
A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially craft
- CVE-2018-1000654Aug 20, 2018affected < 4.17.0-1.2fixed 4.17.0-1.2
GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears
- CVE-2018-6003Jan 22, 2018affected < 4.17.0-1.2fixed 4.17.0-1.2
An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.
- affected < 4.9-1.3fixed 4.9-1.3
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
- CVE-2015-3622May 12, 2015affected < 4.9-1.3fixed 4.9-1.3
The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.
- CVE-2015-2806Apr 10, 2015affected < 4.9-1.3fixed 4.9-1.3
Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
- CVE-2014-3469Jun 5, 2014affected < 4.9-1.3fixed 4.9-1.3
The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
- CVE-2014-3468Jun 5, 2014affected < 4.9-1.3fixed 4.9-1.3
The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
- CVE-2014-3467Jun 5, 2014affected < 4.9-1.3fixed 4.9-1.3
Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.