Package: libcrypto++ / 5.6.4-8
Patch seriesview the series file
|Fix_potential_zeroizer_removal.patch | (download)||
2 1 + 1 - 0 !
[patch] fix potential zeroizer removal (issue 331)
|Hurd compile fix.patch | (download)||
4 2 + 2 - 0 !
[patch] fix compile under debian hurd (i386) debian hurd defines __MACH__, and it was picking up "#define CRYPTOPP_SECTION_INIT __attribute__((section (__DATA,__data)))" intended for Apple linkers
|integer.diff | (download)||
|CVE 2016 9939.patch | (download)||
[patch] fix possible dos in asn.1 decoders (cve-2016-9939)
|Additional_ASN.1_validations.patch | (download)||
[patch] add additional validations based on x.690 rules The library was a tad bit fast and loose with respect to parsing some of the ASN.1 presented to it. It was kind of like we used Alternate Encoding Rules (AER), which was more relaxed than BER, CER or DER. This commit closes most of the gaps. The changes are distantly related to Issue 346. Issue 346 caught a CVE bcause of the transient DoS. These fixes did not surface with negative effcts. Rather, the library was a bit too accomodating to the point it was not conforming
|zinflate 564.diff | (download)||
add inflator::baddistanceerr exception The improved validation and excpetion clears the Address Sanitizer and Undefined Behavior Sanitizer findings