Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: libtasn1

Found 2 matching suggestions

View:
Compact
Detailed
Dismissed
Permalink CVE-2025-13151
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 2 months ago by @tomberek Activity log
  • Created automatic suggestion
  • @tomberek dismissed
CVE-2025-13151

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

Affected products

libtasn1
  • =<4.20.0

Matching in nixpkgs

https://github.com/NixOS/nixpkgs/pull/478141 merged
Untriaged
Permalink CVE-2024-12133
5.3 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
created 6 months ago
Libtasn1: inefficient der decoding in libtasn1 leading to potential remote dos

A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.

References

Affected products

rhcos
libtasn1
  • <4.20.0
  • *
discovery/discovery-ui-rhel9
  • *
discovery/discovery-server-rhel9
  • *
registry.redhat.io/discovery/discovery-ui-rhel9
  • *
registry.redhat.io/discovery/discovery-server-rhel9
  • *

Matching in nixpkgs