diff options
author | Niels Möller <nisse@lysator.liu.se> | 2021-06-02 21:04:13 +0200 |
---|---|---|
committer | Niels Möller <nisse@lysator.liu.se> | 2021-06-02 21:04:13 +0200 |
commit | 52bacacaf4339fd78289f58919732f1f35bea1c1 (patch) | |
tree | 936b914e97ccd27fb4ab9a8e8ac44f9ec0c42c6e | |
parent | 407615c936239fd07bd8dbe4adc495b29d9c53ae (diff) | |
download | nettle-52bacacaf4339fd78289f58919732f1f35bea1c1.tar.gz |
Update Nettle-3.7.3 NEWS, and credit Paul Schaub.nettle_3.7.3_release_20210606release-3.7-fixes
-rw-r--r-- | NEWS | 7 |
1 files changed, 4 insertions, 3 deletions
@@ -9,7 +9,8 @@ NEWS for the Nettle 3.7.3 release ciphertext is in the range 0 < ciphertext < n, before attempting to decrypt it. - Thanks to Justus Winter for reporting these problems. + Thanks to Paul Schaub and Justus Winter for reporting these + problems. The new version is intended to be fully source and binary compatible with Nettle-3.6. The shared library names are @@ -26,8 +27,8 @@ NEWS for the Nettle 3.7.3 release or silently reducing input modulo n. Potential denial of service vector. - * Ensure that all of rsa_decrypt returns failure for out of - range inputs, instead of silently reducing input modulo n. + * Ensure that rsa_decrypt returns failure for out of range + inputs, instead of silently reducing input modulo n. * Ensure that rsa_sec_decrypt returns failure if the message size is too large for the given key. Unlike the other bugs, |