VYPR

rpm package

opensuse/libtasn1&distro=openSUSE Tumbleweed

pkg:rpm/opensuse/libtasn1&distro=openSUSE%20Tumbleweed

Vulnerabilities (10)

  • CVE-2025-13151Jan 7, 2026
    affected < 4.21.0-1.1fixed 4.21.0-1.1

    Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

  • CVE-2024-12133MedFeb 10, 2025
    affected < 4.20.0-1.1fixed 4.20.0-1.1

    A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially craft

  • CVE-2018-1000654Aug 20, 2018
    affected < 4.17.0-1.2fixed 4.17.0-1.2

    GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears

  • CVE-2018-6003Jan 22, 2018
    affected < 4.17.0-1.2fixed 4.17.0-1.2

    An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.

  • CVE-2016-4008MedMay 5, 2016
    affected < 4.9-1.3fixed 4.9-1.3

    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.

  • CVE-2015-3622May 12, 2015
    affected < 4.9-1.3fixed 4.9-1.3

    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.

  • CVE-2015-2806Apr 10, 2015
    affected < 4.9-1.3fixed 4.9-1.3

    Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.

  • CVE-2014-3469Jun 5, 2014
    affected < 4.9-1.3fixed 4.9-1.3

    The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.

  • CVE-2014-3468Jun 5, 2014
    affected < 4.9-1.3fixed 4.9-1.3

    The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.

  • CVE-2014-3467Jun 5, 2014
    affected < 4.9-1.3fixed 4.9-1.3

    Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.