|
Upstream:
- sign(), signonly(), encrypt(), check(), and decrypt() no longer
truncate input on a NUL character.
Security Note:
- This may have security implications as it implies there may be scope
for attacks where two sets of input would give the same output, due to
content after the NUL not being part of the sign'ed content. I may be
misunderstanding the problem, so please check the cited bug for
details
Bug: https://rt.cpan.org/Public/Bug/Display.html?id=133084
Package-Manager: Portage-2.3.103, Repoman-2.3.22
Signed-off-by: Kent Fredric <kentnl@gentoo.org>
|