Arch Linux Security Advisory ASA-201610-8
========================================
Severity: Medium
Date    : 2016-10-12
CVE-ID  : CVE-2016-7420
Package : crypto++
Type    : information disclosure
Remote  : No
Link    : https://wiki.archlinux.org/title/CVE

Summary
======
The package crypto++ before version 5.6.5-1 is vulnerable to
information disclosure.

Resolution
=========
Upgrade to 5.6.5-1.

# pacman -Syu "crypto++>=5.6.5-1"

The problem has been fixed upstream in version 5.6.5.

Workaround
=========
None.

Description
==========
Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement
for a compile-time NDEBUG definition disabling the many assert calls
that are unintended in production use, which might allow context-
dependent attackers to obtain sensitive information by leveraging access
to process memory after an assertion failure, as demonstrated by reading
a core dump.

Impact
=====
An attacker can provide input to programs using crypto++ that may cause
a crash and lead to the disclosure of sensitive information in a core
dump.

References
=========
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7420
https://bugs.archlinux.org/task/51331
https://github.com/weidai11/cryptopp/issues/277
https://www.openwall.com/lists/oss-security/2016/09/15/12

ArchLinux: 201610-8: crypto++: information disclosure

October 12, 2016

Summary

Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG definition disabling the many assert calls that are unintended in production use, which might allow context- dependent attackers to obtain sensitive information by leveraging access to process memory after an assertion failure, as demonstrated by reading a core dump.

Resolution

Upgrade to 5.6.5-1. # pacman -Syu "crypto++>=5.6.5-1"
The problem has been fixed upstream in version 5.6.5.

References

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7420 https://bugs.archlinux.org/task/51331 https://github.com/weidai11/cryptopp/issues/277 https://www.openwall.com/lists/oss-security/2016/09/15/12

Severity
Package : crypto++
Type : information disclosure
Remote : No
Link : https://wiki.archlinux.org/title/CVE

Workaround

None.

Related News