rpm package
suse/libtasn1&distro=SUSE Linux Enterprise Micro 5.3
pkg:rpm/suse/libtasn1&distro=SUSE%20Linux%20Enterprise%20Micro%205.3
Vulnerabilities (3)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-13151 | — | < 4.13-150000.4.14.1 | 4.13-150000.4.14.1 | Jan 7, 2026 | Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string. | ||
| CVE-2024-12133 | Med | 5.3 | < 4.13-150000.4.11.1 | 4.13-150000.4.11.1 | Feb 10, 2025 | A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially craft | |
| CVE-2021-46848 | — | < 4.13-150000.4.8.1 | 4.13-150000.4.8.1 | Oct 24, 2022 | GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der. |
- CVE-2025-13151Jan 7, 2026affected < 4.13-150000.4.14.1fixed 4.13-150000.4.14.1
Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.
- affected < 4.13-150000.4.11.1fixed 4.13-150000.4.11.1
A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially craft
- CVE-2021-46848Oct 24, 2022affected < 4.13-150000.4.8.1fixed 4.13-150000.4.8.1
GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.