Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-13151

Опубликовано: 07 янв. 2026
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libtasn1-6fixed4.21.0-1experimentalpackage
libtasn1-6fixed4.21.0-2package
libtasn1-6no-dsatrixiepackage
libtasn1-6no-dsabookwormpackage
libtasn1-6postponedbullseyepackage

Примечания

  • https://gitlab.com/gnutls/libtasn1/-/issues/55

  • https://gitlab.com/gnutls/libtasn1/-/merge_requests/121

  • https://gitlab.com/gnutls/libtasn1/-/commit/d276cc495a2a32b182c3c39851f1ba58f2d9f9b8 (v4.21.0)

  • Advisory: https://gitlab.com/gnutls/libtasn1/-/blob/master/doc/security/CVE-2025-13151.md

EPSS

Процентиль: 17%
0.00055
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 месяца назад

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

CVSS3: 7.5
nvd
около 1 месяца назад

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

suse-cvrf
17 дней назад

Security update for libtasn1

suse-cvrf
26 дней назад

Security update for libtasn1

CVSS3: 7.5
github
около 1 месяца назад

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

EPSS

Процентиль: 17%
0.00055
Низкий