Botan’s implementation of X.509 name comparisons had a flaw which could result in an out of bound memory read while processing a specially formed DN. This could potentially be exploited for information disclosure or denial of service, or result in incorrect validation results. References: https://botan.randombit.net/security.html https://botan.randombit.net/news.html#version-1-10-16-2017-04-04
Created botan tracking bugs for this issue: Affects: epel-6 [bug 1441130] Affects: epel-7 [bug 1441128] Affects: fedora-all [bug 1441129]
all versions updated and pushed. closing this here.