ArchLinux: 201610-8: crypto++: information disclosure
Summary
Crypto++ (aka cryptopp) through 5.6.4 does not document the requirement for a compile-time NDEBUG definition disabling the many assert calls that are unintended in production use, which might allow context- dependent attackers to obtain sensitive information by leveraging access to process memory after an assertion failure, as demonstrated by reading a core dump.
Resolution
Upgrade to 5.6.5-1.
# pacman -Syu "crypto++>=5.6.5-1"
The problem has been fixed upstream in version 5.6.5.
References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7420 https://bugs.archlinux.org/task/51331 https://github.com/weidai11/cryptopp/issues/277 https://www.openwall.com/lists/oss-security/2016/09/15/12
Workaround
None.