[arch-security] [ASA-201610-8] crypto++: information disclosure
santiago at archlinux.org
Wed Oct 12 15:15:55 UTC 2016
Arch Linux Security Advisory ASA-201610-8
Date : 2016-10-12
CVE-ID : CVE-2016-7420
Package : crypto++
Type : information disclosure
Remote : No
Link : https://wiki.archlinux.org/index.php/CVE
The package crypto++ before version 5.6.5-1 is vulnerable to
Upgrade to 5.6.5-1.
# pacman -Syu "crypto++>=5.6.5-1"
The problem has been fixed upstream in version 5.6.5.
Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement
for a compile-time NDEBUG definition disabling the many assert calls
that are unintended in production use, which might allow context-
dependent attackers to obtain sensitive information by leveraging access
to process memory after an assertion failure, as demonstrated by reading
a core dump.
An attacker can provide input to programs using crypto++ that may cause
a crash and lead to the disclosure of sensitive information in a core
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 801 bytes
Desc: not available
More information about the arch-security