openbsd-ports/security/p5-Crypt-CBC/distinfo
steven 7cff876547 SECURITY update to Crypt::CBC 2.17
Versions of this module prior to 2.17 were incorrectly
using 8 byte IVs when generating the old-style RandomIV style header
(as opposed to the new-style random salt header). This affects data
encrypted using the Rijndael algorithm, which has a 16 byte blocksize,
and is a significant security issue.

The bug has been corrected in versions 2.17 and higher by making it
impossible to use 16-byte block ciphers with RandomIV headers. You may
still read legacy encrypted data by explicitly passing the
-insecure_legacy_decrypt option to Crypt::CBC->new().
2006-03-19 16:03:27 +00:00

5 lines
246 B
Plaintext

MD5 (Crypt-CBC-2.17.tar.gz) = 521bf0506e1da71506dd0f4afd16d8b4
RMD160 (Crypt-CBC-2.17.tar.gz) = 99116bb9eccfc7d1f8f44ce46ee047e7df2d478a
SHA1 (Crypt-CBC-2.17.tar.gz) = 1e5d5fdba77b3425bd780d8aa4ddbcb8c01539cd
SIZE (Crypt-CBC-2.17.tar.gz) = 18543