Hide Forgot
In several places, TMP_ALLOC is used with potentially large arguments. This can cause a stack overflow. Functions taking key_size arguments (e.g., pkcs1_decrypt, pkcs1_encrypt, pkcs1_rsa_digest_encode, ...) and nettle_mpz_random_size are affected.
I got in contact with upstream to get a fix. Once the upstream decides on the fix I'll backport it. http://lists.lysator.liu.se/pipermail/nettle-bugs/2013/002853.html
http://lists.lysator.liu.se/pipermail/nettle-bugs/2013/002898.html
This request was resolved in Red Hat Enterprise Linux 7.0. Contact your manager or support representative in case you have further questions about the request.