An integer overflow flaw was discovered in the CRL parser in libksba, an X.509 and CMS support library, which could result in denial of service or the execution of arbitrary code. Details can be found in the upstream advisory at https://gnupg.org/blog/20221017-pepe-left-the-ksba.html For the stable distribution (bullseye), this problem has been fixed in version 1.5.0-3+deb11u1. We recommend that you upgrade your libksba packages. For the detailed security status of libksba please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libksba
An integer overflow flaw was discovered in the CRL parser in libksba, an X.509 and CMS support library, which could result in denial of service or the execution of arbitrary code.
Details can be found in the upstream advisory at https://gnupg.org/blog/20221017-pepe-left-the-ksba.html
For the stable distribution (bullseye), this problem has been fixed in version 1.5.0-3+deb11u1.
We recommend that you upgrade your libksba packages.
For the detailed security status of libksba please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libksba