MGASA-2017-0321

Source
https://advisories.mageia.org/MGASA-2017-0321.html
Import Source
https://advisories.mageia.org/MGASA-2017-0321.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0321
Related
Published
2017-09-01T21:10:29Z
Modified
2017-09-01T20:48:40Z
Summary
Updated botan packages fix security vulnerabilities
Details

While decoding BER length fields, an integer overflow could occur. This could occur while parsing untrusted inputs such as X.509 certificates. The overflow does not seem to lead to any obviously exploitable condition, but exploitation cannot be positively ruled out. Only 32-bit platforms are likely affected; to cause an overflow on 64-bit the parsed data would have to be many gigabytes (CVE-2016-9132).

Aleksandar Nikolic discovered that an error in the x509 parser of the Botan crypto library could result in an out-of-bounds memory read, resulting in denial of service or an information leak if processing a malformed certificate (CVE-2017-2801).

References
Credits

Affected packages

Mageia:5 / botan

Package

Name
botan
Purl
pkg:rpm/mageia/botan?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.10.14-1.mga5

Ecosystem specific

{
    "section": "core"
}