mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-31 19:24:42 +02:00
Update release note credits
This commit is contained in:
@@ -106,7 +106,8 @@ in a specific use case, 1 fix for DTLS.
|
|||||||
wolfSSL, and are doing private key operations on the system (such as signing
|
wolfSSL, and are doing private key operations on the system (such as signing
|
||||||
with a private key) are recommended to regenerate private keys and update to
|
with a private key) are recommended to regenerate private keys and update to
|
||||||
the most recent version of wolfSSL. CVE-2020-15309 is reserved for this
|
the most recent version of wolfSSL. CVE-2020-15309 is reserved for this
|
||||||
issue. Thanks to Ida Bruhns from Universität zu Lübeck for the report.
|
issue. Thanks to Ida Bruhns from Universität zu Lübeck and Samira Briongos
|
||||||
|
from NEC Laboratories Europe for the report.
|
||||||
* When using SGX with EC scalar multiplication the possibility of side-channel
|
* When using SGX with EC scalar multiplication the possibility of side-channel
|
||||||
attacks are present. To mitigate the risk of side channel attacks wolfSSL’s
|
attacks are present. To mitigate the risk of side channel attacks wolfSSL’s
|
||||||
single precision EC operations should be used instead. Release 4.5.0 turns
|
single precision EC operations should be used instead. Release 4.5.0 turns
|
||||||
|
Reference in New Issue
Block a user