Mandriva Linux Security Advisory 2015-151 - By using special crafted S/MIME messages or ECC based OpenPGP data, it is possible to create a buffer overflow, which could lead to a denial of service.
1add60a90a331e79ae3a51ec429b60dade7f3f8e3a7013fb05725a11c2f861a6
Ubuntu Security Notice 2427-1 - Hanno Bock discovered that Libksba incorrectly handled certain S/MIME messages or ECC based OpenPGP data. An attacker could use this issue to cause Libksba to crash, resulting in a denial of service, or possibly execute arbitrary code.
f5cd342ed6be07a6d1c5d748def8c51af71ac915a866fd5ac48d17039b860a6a
Debian Linux Security Advisory 3078-1 - An integer underflow flaw, leading to a heap-based buffer overflow, was found in the ksba_oid_to_str() function of libksba, an X.509 and CMS (PKCS#7) library. By using special crafted S/MIME messages or ECC based OpenPGP data, it is possible to create a buffer overflow, which could cause an application using libksba to crash (denial of service), or potentially, execute arbitrary code.
7217c0ae2ea44f802fdb12bc21101dee31a22b1db69bedc15efca5b833bb17cc
Mandriva Linux Security Advisory 2014-234 - Updated libksba packages fix a security vulnerability. By using special crafted S/MIME messages or ECC based OpenPGP data, it is possible to create a buffer overflow, which could lead to a denial of service.
4161d0bb416d2018777c709cd2038b0aaa0dba746d8e27b13c8d1dccd3322e19