summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
Merge libcrypto++ (8.7.0+git220824-1) import into refs/heads/workingbranch
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
use crypto++ instead of cryptopp
Forwarded: not-needed
Last-Update: 2022-08-24
Gbp-Pq: Name fix_library_name.patch
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
libcrypto++ (8.7.0+git220824-1) unstable; urgency=medium
* New git snapshot release.
[dgit import unpatched libcrypto++ 8.7.0+git220824-1]
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
Import libcrypto++_8.7.0+git220824.orig.tar.gz
[dgit import orig libcrypto++_8.7.0+git220824.orig.tar.gz]
Laszlo Boszormenyi (GCS) [Thu, 25 Aug 2022 17:44:25 +0000 (18:44 +0100)]
Import libcrypto++_8.7.0+git220824-1.debian.tar.xz
[dgit import tarball libcrypto++ 8.7.0+git220824-1 libcrypto++_8.7.0+git220824-1.debian.tar.xz]
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
Merge libcrypto++ (8.6.0-3) import into refs/heads/workingbranch
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
use crypto++ instead of cryptopp
Forwarded: not-needed
Last-Update: 2022-02-12
Gbp-Pq: Name fix_library_name.patch
Jeffrey Walton [Thu, 10 Feb 2022 23:56:24 +0000 (18:56 -0500)]
[PATCH] Don't use -march=armv7 when compiler already offers it (GH #1094)
Gbp-Pq: Name armhf_FTBFS_fix.patch
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
GNUmakefile_update
Gbp-Pq: Name GNUmakefile_update.patch
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
libcrypto++ (8.6.0-3) unstable; urgency=medium
* Fix armhf FTBFS (closes: #
1001995).
[dgit import unpatched libcrypto++ 8.6.0-3]
Laszlo Boszormenyi (GCS) [Sat, 12 Feb 2022 09:39:14 +0000 (09:39 +0000)]
Import libcrypto++_8.6.0-3.debian.tar.xz
[dgit import tarball libcrypto++ 8.6.0-3 libcrypto++_8.6.0-3.debian.tar.xz]
Laszlo Boszormenyi (GCS) [Sat, 25 Sep 2021 09:23:06 +0000 (10:23 +0100)]
Import libcrypto++_8.6.0.orig.tar.gz
[dgit import orig libcrypto++_8.6.0.orig.tar.gz]
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
Merge libcrypto++ (8.4.0-1) import into refs/heads/workingbranch
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
use crypto++ instead of cryptopp
Forwarded: not-needed
Last-Update: 2021-01-02
Gbp-Pq: Name fix_library_name.patch
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
libcrypto++ (8.4.0-1) unstable; urgency=medium
* New upstream release.
* Update patches.
[dgit import unpatched libcrypto++ 8.4.0-1]
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
Import libcrypto++_8.4.0.orig.tar.gz
[dgit import orig libcrypto++_8.4.0.orig.tar.gz]
Laszlo Boszormenyi (GCS) [Sat, 2 Jan 2021 07:22:09 +0000 (07:22 +0000)]
Import libcrypto++_8.4.0-1.debian.tar.xz
[dgit import tarball libcrypto++ 8.4.0-1 libcrypto++_8.4.0-1.debian.tar.xz]
Laszlo Boszormenyi (GCS) [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
Merge libcrypto++ (5.6.4-8) import into refs/heads/workingbranch
Jeffrey Walton [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
Add Inflator::BadDistanceErr exception
Origin: upstream, https://github.com/weidai11/cryptopp/commit/
07dbcc3d9644b18e05c1776db2a57fe04d780965
Bug: https://github.com/weidai11/cryptopp/issues/414
Last-Update: 2017-06-05
The improved validation and excpetion clears the Address Sanitizer and
Undefined Behavior Sanitizer findings
Gbp-Pq: Name zinflate-564.diff
Jeffrey Walton [Sat, 24 Dec 2016 09:55:21 +0000 (04:55 -0500)]
[PATCH] Add additional validations based on X.690 rules
The library was a tad bit fast and loose with respect to parsing some of the ASN.1 presented to it. It was kind of like we used Alternate Encoding Rules (AER), which was more relaxed than BER, CER or DER. This commit closes most of the gaps.
The changes are distantly related to Issue 346. Issue 346 caught a CVE bcause of the transient DoS. These fixes did not surface with negative effcts. Rather, the library was a bit too accomodating to the point it was not conforming
Gbp-Pq: Name Additional_ASN.1_validations.patch
Gergely Nagy [Wed, 14 Dec 2016 12:19:01 +0000 (13:19 +0100)]
[PATCH] Fix possible DoS in ASN.1 decoders (CVE-2016-9939)
Gbp-Pq: Name CVE-2016-9939.patch
Laszlo Boszormenyi (GCS) [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
integer
Gbp-Pq: Name integer.diff
Jeffrey Walton [Fri, 28 Oct 2016 04:33:43 +0000 (00:33 -0400)]
[PATCH] Fix compile under Debian Hurd (i386) Debian Hurd defines __MACH__, and it was picking up "#define CRYPTOPP_SECTION_INIT __attribute__((section (__DATA,__data)))" intended for Apple linkers
Gbp-Pq: Name Hurd-compile-fix.patch
Jeffrey Walton [Tue, 1 Nov 2016 02:34:59 +0000 (22:34 -0400)]
[PATCH] Fix potential zeroizer removal (Issue 331)
Gbp-Pq: Name Fix_potential_zeroizer_removal.patch
Laszlo Boszormenyi (GCS) [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
libcrypto++ (5.6.4-8) unstable; urgency=medium
* Install all headers (closes: #866100).
* Update watch file (closes: #862876).
* Update Standards-Version to 4.0.0 and debhelper level to 10 .
[dgit import unpatched libcrypto++ 5.6.4-8]
Laszlo Boszormenyi (GCS) [Tue, 27 Jun 2017 19:04:20 +0000 (20:04 +0100)]
Import libcrypto++_5.6.4-8.debian.tar.xz
[dgit import tarball libcrypto++ 5.6.4-8 libcrypto++_5.6.4-8.debian.tar.xz]
Jeffrey Walton [Mon, 5 Jun 2017 06:55:28 +0000 (07:55 +0100)]
Add Inflator::BadDistanceErr exception
Origin: upstream, https://github.com/weidai11/cryptopp/commit/
07dbcc3d9644b18e05c1776db2a57fe04d780965
Bug: https://github.com/weidai11/cryptopp/issues/414
Last-Update: 2017-06-05
The improved validation and excpetion clears the Address Sanitizer and
Undefined Behavior Sanitizer findings
Gbp-Pq: Name zinflate-564.diff
Jeffrey Walton [Sat, 24 Dec 2016 09:55:21 +0000 (04:55 -0500)]
[PATCH] Add additional validations based on X.690 rules
The library was a tad bit fast and loose with respect to parsing some of the ASN.1 presented to it. It was kind of like we used Alternate Encoding Rules (AER), which was more relaxed than BER, CER or DER. This commit closes most of the gaps.
The changes are distantly related to Issue 346. Issue 346 caught a CVE bcause of the transient DoS. These fixes did not surface with negative effcts. Rather, the library was a bit too accomodating to the point it was not conforming
Gbp-Pq: Name Additional_ASN.1_validations.patch
Gergely Nagy [Wed, 14 Dec 2016 12:19:01 +0000 (13:19 +0100)]
[PATCH] Fix possible DoS in ASN.1 decoders (CVE-2016-9939)
Gbp-Pq: Name CVE-2016-9939.patch
Laszlo Boszormenyi (GCS) [Mon, 5 Jun 2017 06:55:28 +0000 (07:55 +0100)]
integer
Gbp-Pq: Name integer.diff
Jeffrey Walton [Fri, 28 Oct 2016 04:33:43 +0000 (00:33 -0400)]
[PATCH] Fix compile under Debian Hurd (i386) Debian Hurd defines __MACH__, and it was picking up "#define CRYPTOPP_SECTION_INIT __attribute__((section (__DATA,__data)))" intended for Apple linkers
Gbp-Pq: Name Hurd-compile-fix.patch
Jeffrey Walton [Tue, 1 Nov 2016 02:34:59 +0000 (22:34 -0400)]
[PATCH] Fix potential zeroizer removal (Issue 331)
Gbp-Pq: Name Fix_potential_zeroizer_removal.patch
Laszlo Boszormenyi (GCS) [Mon, 5 Jun 2017 06:55:28 +0000 (07:55 +0100)]
libcrypto++ (5.6.4-7) unstable; urgency=high
* Backport security fix for out-of-bounds read in zinflate.
[dgit import unpatched libcrypto++ 5.6.4-7]
Laszlo Boszormenyi (GCS) [Mon, 5 Jun 2017 06:55:28 +0000 (07:55 +0100)]
Import libcrypto++_5.6.4-7.debian.tar.xz
[dgit import tarball libcrypto++ 5.6.4-7 libcrypto++_5.6.4-7.debian.tar.xz]
Laszlo Boszormenyi (GCS) [Sat, 8 Oct 2016 16:27:30 +0000 (17:27 +0100)]
Import libcrypto++_5.6.4.orig.tar.xz
[dgit import orig libcrypto++_5.6.4.orig.tar.xz]