144343043b
- Update to 3.4.1 release * Fix CVE-2018-16869 (bsc#1118086) All functions using RSA private keys are now side-channel silent, meaning that they try hard to avoid any branches or memory accesses depending on secret data. This applies both to the bignum calculations, which now use GMP's mpn_sec_* family of functions, and the processing of PKCS#1 padding needed for RSA decryption. * Changes in behavior: The functions rsa_decrypt and rsa_decrypt_tr may now clobber all of the provided message buffer, independent of the actual message length. They are side-channel silent, in that branches and memory accesses don't depend on the validity or length of the message. Side-channel leakage from the caller's use of length and return value may still provide an oracle useable for a Bleichenbacher-style chosen ciphertext attack. Which is why the new function rsa_sec_decrypt is recommended. * New features: A new function rsa_sec_decrypt. * Bug fixes: - Fix bug in pkcs1-conv, missing break statements in the parsing of PEM input files. - Fix link error on the pss-mgf1-test test, affecting builds without public key support. OBS-URL: https://build.opensuse.org/request/show/662469 OBS-URL: https://build.opensuse.org/package/show/security:tls/libnettle?expand=0&rev=5 |
||
---|---|---|
.gitattributes | ||
.gitignore | ||
baselibs.conf | ||
libnettle.changes | ||
libnettle.keyring | ||
libnettle.spec | ||
nettle-3.4.1.tar.gz | ||
nettle-3.4.1.tar.gz.sig | ||
nettle-respect-cflags.patch |