diff options
author | Werner Koch <wk@gnupg.org> | 2014-08-18 08:46:23 +0200 |
---|---|---|
committer | Werner Koch <wk@gnupg.org> | 2014-08-18 08:46:23 +0200 |
commit | 5958574a8285e9d759d7d95418cacd3d352f77a2 (patch) | |
tree | 4a80101d5fa7e7fe6ad192c65a8510a446ddc7b3 | |
parent | f393433a53fde259fbd1d81f2bd1ec19d6463982 (diff) | |
download | libgcrypt-5958574a8285e9d759d7d95418cacd3d352f77a2.tar.gz |
Add CVE id to 1.5.4 NEWS.
--
Note that the 1.6 branch and later versions were not vulnerable
because they already used the sliding window method.
-rw-r--r-- | NEWS | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -10,7 +10,7 @@ Noteworthy changes in version 1.5.4 (2014-08-07) [C19/A8/R3] Backported from 1.6: * Improved performance of RSA, DSA, and Elgamal by using a new - exponentiation algorithm. + exponentiation algorithm. [CVE-2014-5270] * Fixed a subtle bug in mpi_set_bit which could set spurious bits. |