Date: Wed, 11 May 2016 10:44:21 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 209451] [maintainer-update] update security/p5-Crypt-PWSafe3 to 1.22 Message-ID: <bug-209451-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D209451 Bug ID: 209451 Summary: [maintainer-update] update security/p5-Crypt-PWSafe3 to 1.22 Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: alexander.4mail@gmail.com Created attachment 170209 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D170209&action= =3Dedit p5-Crypt-PWSafe3-1.22.diff Update to version 1.22. >From changelog: Records created by Crypt::PWSafe3 (eg. the ones fetched with getrecords) are now associated with the parent object,=20 so that you can modify them directly and call $vault->save afterwards witho= ut using $vault->modifyrecord.=20 Erase passwd from memory using zeros instead of random bytes. fixes github#= 9.=20 Fixed rt.cpan.org#112975: Crypt::ECB (which we use) have been reworked and among other issues it fixed handline of padding.=20 PWSafe3.pm did not specify a padding scheme (because it doesn't use it) and therefore Crypt::ECB enforced a default scheme=20 which lead to an invalid key size. Now we specify explicitly padding:none, = as suggested by Christoph Appel. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-209451-13>