Synopsis:          Moderate: libtasn1 security update
Advisory ID:       SLSA-2014:0596-1
Issue Date:        2014-06-03
CVE Numbers:       CVE-2014-3467
                   CVE-2014-3468
                   CVE-2014-3469
--

It was discovered that the asn1_get_bit_der() function of the libtasn1
library incorrectly reported the length of ASN.1-encoded data. Specially
crafted ASN.1 input could cause an application using libtasn1 to perform
an out-of-bounds access operation, causing the application to crash or,
possibly, execute arbitrary code. (CVE-2014-3468)

Multiple incorrect buffer boundary check issues were discovered in
libtasn1. Specially crafted ASN.1 input could cause an application using
libtasn1 to crash. (CVE-2014-3467)

Multiple NULL pointer dereference flaws were found in libtasn1's
asn1_read_value() function. Specially crafted ASN.1 input could cause an
application using libtasn1 to crash, if the application used the
aforementioned function in a certain way. (CVE-2014-3469)

For the update to take effect, all applications linked to the libtasn1
library must be restarted.
--

SL6
  x86_64
    libtasn1-2.3-6.el6_5.i686.rpm
    libtasn1-2.3-6.el6_5.x86_64.rpm
    libtasn1-debuginfo-2.3-6.el6_5.i686.rpm
    libtasn1-debuginfo-2.3-6.el6_5.x86_64.rpm
    libtasn1-devel-2.3-6.el6_5.i686.rpm
    libtasn1-devel-2.3-6.el6_5.x86_64.rpm
    libtasn1-tools-2.3-6.el6_5.x86_64.rpm
  i386
    libtasn1-2.3-6.el6_5.i686.rpm
    libtasn1-debuginfo-2.3-6.el6_5.i686.rpm
    libtasn1-devel-2.3-6.el6_5.i686.rpm
    libtasn1-tools-2.3-6.el6_5.i686.rpm

- Scientific Linux Development Team