CVE-2016-9132

Priority
Description
In Botan 1.8.0 through 1.11.33, when decoding BER data an integer overflow
could occur, which would cause an incorrect length field to be computed.
Some API callers may use the returned (incorrect and attacker controlled)
length field in a way which later causes memory corruption or other
failure.
Package
Upstream:released (1.10.14-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (1.10.14-1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (1.10.14-1)
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan):DNE
Patches:
Upstream:https://github.com/randombit/botan/commit/987ad747db6d0d7e36f840398f3cf02e2fbfd90f
Package
Upstream:needed
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan):DNE
More Information

Updated: 2019-04-22 21:23:57 UTC (commit 750f6738e68600bdf0b7c7ef543b49378c330e4e)