Package Release Info

libcryptopp-8.9.0-160000.2.2

Update Info: Base Release
Available in Package Hub : 16.0

platforms

AArch64
ppc64le
s390x
x86-64

subpackages

libcryptopp-devel
libcryptopp8_9_0

Change Logs

* Thu May 29 2025 angel.yankov@suse.com
- Security fix [bsc#1224280, CVE-2024-28285]
  * potential leak of secret key of ElGamal encryption via fault injection
  * Added patch libcryptopp-CVE-2024-28285.patch
  * https://github.com/weidai11/cryptopp/issues/1262
* Mon Feb 03 2025 guillaume.gardet@opensuse.org
- Rename patch to patchlevel to avoid confusion on check and avoid:
  line 75: Patch number not specified: patch
* Thu Jan 04 2024 pgajdos@suse.com
- security update
- added patches
  fix CVE-2023-50981 [bsc#1218222], issue on ModularSquareRoot function leads to potential DoS
  https://github.com/weidai11/cryptopp/pull/1255
  + libcryptopp-CVE-2023-50981.patch
* Thu Dec 21 2023 pgajdos@suse.com
- version update to 8.9.0
  * Crypto++ 8.9 was released on October 1, 2023. The 8.9 release
    was a minor, unplanned release. There were no CVEs and one
    memory error.
  * The 8.9 release was driven by the fix for `ProcessData`, and
    the failures when `inString==outString`. Also see GH #1231,
    Rabbit Produces null Keystream When inString == outString.
  * Release notes
  * ===========
  * minor release, recompile of programs required
  * expanded community input and support
  * 88 unique contributors as of this release
  * add additional tests to datatest.cpp
  * fix SIMON128 Asan finding on POWER8
  * fix AES/CFB and AES/CTR modes self test failures when using
    Cryptogams AES on ARMv7
  * fix ARIA/CTR mode self test failures when inString==outString
  * fix HIGHT/CTR mode self test failures when
    inString==outString
  * fix Rabbit/CTR mode self test failures when
    inString==outString
  * fix HC128/CTR and HC256/CTR mode self test failures when
    inString==outString
  * fix Prime Table and dangling reference to a temporary
  * fix Singleton::Ref() when using C++11 memory fences
  * remove unneeded call to Crop() in Randomize()
- modified patches
  % libcryptopp-shared.patch (refreshed)
- modified sources
  % baselibs.conf
- added patches
  fix CVE-2023-50980 [bsc#1218219], DoS via malformed DER public key file
  + libcryptopp-CVE-2023-50980.patch
* Sun Jul 16 2023 dmueller@suse.com
- update to 8.8.0:
  * minor release, recompile of programs required
  * expanded community input and support
  * 88 unique contributors as of this release
  * fix crash in cryptest.exe when invoked with no options
  * fix crash in library due to GCC removing live code
  * fix RSA with key size 16 may provide an invalid key
  * fix failure to build on 32-bit x86
  * fix failure to build on iPhone Simulator for arm64
  * fix failure to build on Windows arm64
  * test for SSSE3 before using the ISA
  * fix include of  when using MSVC
  * improve performance of CRC32C_Update_SSE42 for x86-64
  * update documentation
* Wed Aug 10 2022 bwiedemann@suse.com
- Enable SSE2 to fix i586 build
* Tue Aug 09 2022 bwiedemann@suse.com
- Update to 8.7.0
- https://cryptopp.com/release870.html
  * fix RSA key generation for small moduli (GH #1136)
  * fix AES-GCM with AESNI but without CLMUL (GH #1132)
  * rework CFB_CipherTemplate::ProcessData and AdditiveCipherTemplate::ProcessData (GH #1088, GH #1103)
    + restored performance and avoided performance penalty of a temp buffer
  * fix undersized SecBlock buffer in Integer bit operations (GH #1072)
  * work around several GCC 11 & 12 problems
* Sat Sep 25 2021 davejplater@gmail.com
- Update to 8.6.0
-upstream changes:
  * This release clears CVE-2021-40530 and fixes a problem with
  ChaCha20 AVX2 implementation.
  * The CVE was due to ElGamal encryption using a work estimate to
  size encryption exponents instead subgroup order.
  * The ChaCha20 issue was due to mishandling a carry in the AVX2
  code path. The ChaCha20 issue was difficult to duplicate, so
  most users should not experience it.
* Wed Mar 17 2021 dmueller@suse.com
- update to 8.5.0:
  * minor release, no recompile of programs required
  * expanded community input and support
  * 70 unique contributors as of this release
  * port to Apple M1 hardware
* Sat Jan 02 2021 davejplater@gmail.com
- Update to version 8.4.0 and remove obsolete patches:
  0001-Fix-TCXXFLAGS-using-openSUSE-standard-flags-GH-865.patch,
  0001-Fix-missing-if-statement.patch and cve-2019-14318.patch
- Upstream changes:
  * fix use of macro CRYPTOPP_ALIGN_DATA
  * fix potential out-of-bounds read in ECDSA
  * fix std::bad_alloc when using ByteQueue in pipeline
  * fix missing CRYPTOPP_CXX17_EXCEPTIONS with Clang
  * fix potential out-of-bounds read in GCM mode
  * add configure.sh when preprocessor macros fail
  * fix potential out-of-bounds read in SipHash
  * fix compile error on POWER9 due to vec_xl_be
  * fix K233 curve on POWER8
  * add Cirrus CI testing
  * fix broken encryption for some 64-bit ciphers
  * disable RDRAND and RDSEED for some AMD processors
  * fix BLAKE2 hash calculation using Salt and Personalization
  * add XTS mode
  * fix circular dependency between misc.h and secblock.h
  * add Certificate interface
  * fix recursion in AES::Encryption without AESNI
  * add missing OID for ElGamal encryption
  * fix missing override in KeyDerivationFunction-derived classes
  * fix RDSEED assemble under MSVC
  * fix elliptic curve timing leaks (CVE-2019-14318)
  * add link-library variable to Makefiles
  * fix SIZE_MAX definition in misc.h
  * add GetWord64 and PutWord64 to BufferedTransformation
  * use HKDF in AutoSeededX917RNG::Reseed
  * fix Asan finding in VMAC on i686 in inline asm
  * fix undeclared identifier _mm_roti_epi64 on Gentoo
  * fix ECIES and GetSymmetricKeyLength
  * fix possible divide by zero in PKCS5_PBKDF2_HMAC
  * refine ASN.1 encoders and decoders
  * disable BMI2 code paths in Integer class
  * fix use of CRYPTOPP_CLANG_VERSION
  * add NEON SHA1, SHA256 and SHA512 from Cryptogams
  * add ARM SHA1, SHA256 and SHA512 from Cryptogams
  * fix reference binding to misaligned address in xed25519
  * clear asserts in TestDataNameValuePairs
  * fix SIGILL on POWER8 when compiling with GCC 10
  * fix potential out-of-bounds write in FixedSizeAllocatorWithCleanup
  * revert changes for constant-time elliptic curve algorithms
Version: 5.6.5-bp150.3.3.1
* Mon Aug 12 2019 Dave Plater <davejplater@gmail.com>
- Added cve-2019-14318-CryptoPP564.patch which fixes (1)leak in
  ECDSA nonce length; and (2) leak in prime fields (ECP class).
- See boo#1143532
Version: 5.6.5-bp150.2.4
* Sat May 20 2017 bwiedemann@suse.com
- Add reproducible.patch to sort input files to make build fully reproducible
* Fri Mar 03 2017 davejplater@gmail.com
- Added patch field to soname due to library not following proper
  API/ABI versioning to fix boo#1027192.
- Removed crypto.pc and generate it in the spec file to ensure
  proper version and directories.
- Changed libcryptopp-shared.patch.
- Renamed library package and obsoleted old name.
- added precheckin_baselibs.sh and updated baselibs.conf
* Thu Feb 23 2017 adam@mizerski.pl
- update to 5.6.5
  * Rebase libcryptopp-shared.patch
  * Rebase 0001-disable_os_rng_test.patch
- enable openmp usage
* Thu Feb 02 2017 jengelh@inai.de
- Add obsoletes tag for dropped static lib
* Sat Jan 28 2017 jengelh@inai.de
- Remove libcryptoo-devel-static, this seems unused in Factory.
* Sat Jan 28 2017 jengelh@inai.de
- Update descriptions
* Mon Sep 12 2016 bwiedemann@suse.com
- Update to 5.6.4
  * Use proper openSUSE-style library naming
  * Drop upstream libcryptopp-s390.patch
  * Drop upstream libcryptopp-m68k.patch
  * Drop upstream libcryptopp-CVE-2015-2141.patch
  * Drop upstream cryptopp-gcc6.patch
  * Rebase libcryptopp-shared.patch
  * Rebase 0001-disable_os_rng_test.patch
* Mon Jun 20 2016 i@marguerite.su
- add patch cryptopp-gcc6.patch
  * fix boo#985143
  * fix narrowing conversion from unsigned int to int inside {}
* Wed Jul 08 2015 bwiedemann@suse.com
- prevent timing attack to get secret key (bnc#936435, CVE-2015-2141)
  add libcryptopp-CVE-2015-2141.patch
* Fri Aug 15 2014 sfalken@opensuse.org
- Added 0001-disable_os_rng_test.patch
  Fixes buildfailure on openSUSE_Factory x86_64 within OBS environment,
  due to OS supplied Random Number Generator taking too long to respond
* Thu Apr 03 2014 schwab@suse.de
- libcryptopp-m68k.patch: define IS_LITTLE_ENDIAN on m68k
* Wed Dec 18 2013 ro@suse.de
- define as big endian on s390/s390x (libcryptopp-s390.patch)
* Wed Aug 28 2013 dmueller@suse.com
- remove noninstallable 32bit -devel baselibs
* Fri Mar 01 2013 adam@mizerski.pl
- update to 5.6.2
  - changed license to Boost Software License 1.0
  - added SHA-3 (Keccak)
  - updated DSA to FIPS 186-3 (see DSA2 class)
  - fixed Blowfish minimum keylength to be 4 bytes (32 bits)
  - fixed Salsa validation failure when compiling with GCC 4.6
  - fixed infinite recursion when on x64, assembly disabled, and
    no AESNI
  - ported to MSVC 2012, GCC 4.7, Clang 3.2, Solaris Studio 12.3,
    Intel C++ Compiler 13.0
- removed libcryptopp-gcc47.patch - fixed upstream
- rebased libcryptopp-shared.patch
- added devel-static subpackage
- updated license tag
* Sun Oct 14 2012 adam@mizerski.pl
- added baselibs.conf
- spec file improved
* Sat Mar 17 2012 dimstar@opensuse.org
- Add libcryptopp-gcc47.patch: Fix build with gcc 4.7.
* Sun Feb 05 2012 jengelh@medozas.de
- Proper shared library versioning
* Mon Oct 17 2011 jengelh@medozas.de
- Remove bogus Conflict against libcrypto++0 (cf. shlib guidelines)
* Fri Oct 14 2011 toddrme2178@gmail.com
- Added pkg-config file from fedora project
- Cleaned up spec file formatting
* Sun Jul 10 2011 meissner@suse.de
- add -lpthread for tests