From $URL: 2016-11-27 (CVE-2016-9132) Integer overflow in BER decoder While decoding BER length fields, an integer overflow could occur. This could occur while parsing untrusted inputs such as X.509 certificates. The overflow does not seem to lead to any obviously exploitable condition, but exploitation cannot be positively ruled out. Only 32-bit platforms are likely affected; to cause an overflow on 64-bit the parsed data would have to be many gigabytes. Bug found by Falko Strenzke, cryptosource GmbH. Fixed in 1.10.14 and 1.11.34, all prior versions affected.
Fixed versions are already in Gentoo repository since commit 14ab24951ea392b9e8c62aa3441ac050d6ecdf58 and c31efdd2b1cd740923f9d3d2c14870309df3cf20 @ Arches, please test and mark stable: =dev-libs/botan-1.10.14
amd64 stable
x86 stable
sparc stable
Stable for HPPA.
ppc stable
ppc64 stable. Maintainer(s), please cleanup. Security, please vote.
(In reply to Agostino Sarubbo from comment #7) > Maintainer(s), please cleanup. Done.
GLSA Vote: No