./security/crypto++, Free C++ class library of Cryptographic Primitives

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: pkgsrc-2017Q1, Version: 5.6.5, Package name: cryptopp-5.6.5, Maintainer: pkgsrc-users

Crypto++ Library is a free C++ class library of cryptographic schemes.
One purpose of Crypto++ is to act as a repository of public domain
(not copyrighted) source code. Although the library is copyrighted as
a compilation, the individual files in it (except for a few exceptions
listed in the license) are in the public domain.


Required to build:
[pkgtools/cwrappers]

Master sites:

SHA1: a74f207a315b6a133af9640a45bde9d6e378af4d
RMD160: 4c13bb99dd205d54598527386e88b0dd436fc524
Filesize: 4121.917 KB

Version history: (Expand)


CVS history: (Expand)


   2017-05-29 20:37:29 by Benny Siegert | Files touched by this commit (7)
Log message:
Pullup ticket #5457 - requested by sevan
security/crypto++: security fix

Revisions pulled up:
- security/crypto++/Makefile                                    1.21
- security/crypto++/PLIST                                       1.7
- security/crypto++/buildlink3.mk                               1.13
- security/crypto++/distinfo                                    1.12
- security/crypto++/patches/patch-GNUmakefile                   1.1
- security/crypto++/patches/patch-aa                            deleted
- security/crypto++/patches/patch-config.h                      deleted

---
   Module Name:    pkgsrc
   Committed By:   adam
   Date:           Thu May 18 21:20:23 UTC 2017

   Modified Files:
           pkgsrc/security/crypto++: Makefile PLIST buildlink3.mk distinfo
   Added Files:
           pkgsrc/security/crypto++/patches: patch-GNUmakefile
   Removed Files:
           pkgsrc/security/crypto++/patches: patch-aa patch-config.h

   Log message:
   Crypto++ 5.6.5

   The 5.6.5 release was mostly a maintenance release. The release included
   two CVE fixes.

   The first, CVE-2016-7420, was a procedural finding due to external build
   systems failing to define NDEBUG for release builds. The gap was the
   project's failure to tell users to define NDEBUG. The
   second, CVE-2016-7544, was a potential memory corruption on Windows
   platforms when using Microsoft compilers due to use of _malloca and _freea.

   Due to CVE-2016-7420 and the possibility for an unwanted assert to
   egress data, users and distros are encouraged to recompile the library
   and all dependent programs.