f3cf746bb3
upgrade to 1.0.20; Mr. Hornik has discovered error in X.509 certificate chain verification procedure in GnuTLS library. The certificate chain should be verified from last root certificate to the first certificate. Otherwise a lot of unauthorized CPU processing can be forced to check certificate signatures signed with arbitrary RSA/DSA keys chosen by attacker.; ok maintainer
4 lines
206 B
Plaintext
4 lines
206 B
Plaintext
MD5 (gnutls-1.0.20.tar.gz) = 3a06e6db06c6c6c9a9929dfd9d361cbe
|
|
RMD160 (gnutls-1.0.20.tar.gz) = 2e739ae22c245651b6c1120932b52544c056ff66
|
|
SHA1 (gnutls-1.0.20.tar.gz) = ef2ea2a444b2d2004a8a8ebc7770e70802b20e9a
|