SB2015041616 - Fedora EPEL 7 update for mingw-gnutls, mingw-libtasn1, mingw-p11-kit
Published: April 16, 2015 Updated: April 24, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2015-3308)
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service or possibly have unspecified other impact via a crafted CRL distribution point.
2) Stack-based buffer overflow (CVE-ID: CVE-2015-2806)
The vulnerability allows a remote attacker to bypass security restrictions.The weakness exists due to stack-based buffer overflow in asn1_der_decoding. A remote attacker can trigger memory corruption and have unspecified impact on the system.
Remediation
Install update from vendor's website.