Integer Overflow or Wraparound Affecting libksba-devel package, versions <0:1.3.0-6.el7_9


Severity

Recommended
0.0
high
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
1.19% (85th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-LIBKSBADEVEL-3051555
  • published18 Oct 2022
  • disclosed17 Oct 2022

Introduced: 17 Oct 2022

CVE-2022-3515  (opens in a new tab)
CWE-190  (opens in a new tab)

How to fix?

Upgrade RHEL:7 libksba-devel to version 0:1.3.0-6.el7_9 or higher.
This issue was patched in RHSA-2022:7088.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libksba-devel package and not the libksba-devel package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.

CVSS Scores

version 3.1