CVE-2016-9132

Priority
Description
In Botan 1.8.0 through 1.11.33, when decoding BER data an integer overflow
could occur, which would cause an incorrect length field to be computed.
Some API callers may use the returned (incorrect and attacker controlled)
length field in a way which later causes memory corruption or other
failure.
Ubuntu-Description
It was discovered that Botan did not properly decode BER data while parsing
untrusted inputs such as X.509 certificates. An attacker could possibly
use this issue to cause memory corruption or other failure, resulting in an
integer overflow attack.
Notes
Package
Upstream:released (1.10.14-1)
Ubuntu 18.04 LTS:not-affected (1.10.14-1)
Ubuntu 20.04 LTS:DNE
Ubuntu 21.10:DNE
Ubuntu 22.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was needed)
Patches:
Upstream:https://github.com/randombit/botan/commit/987ad747db6d0d7e36f840398f3cf02e2fbfd90f
Package
Upstream:needed
Ubuntu 18.04 LTS:DNE
Ubuntu 20.04 LTS:DNE
Ubuntu 21.10:DNE
Ubuntu 22.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
More Information

Updated: 2022-04-25 00:18:13 UTC (commit ecc1009cb19540b950de59270950018900f37f15)