Return-Path: Received: from smtp3.osuosl.org (smtp3.osuosl.org [140.211.166.136]) by lists.linuxfoundation.org (Postfix) with ESMTP id 80B34C002A for ; Mon, 10 Apr 2023 20:00:55 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id D6276607C1 for ; Mon, 10 Apr 2023 20:00:54 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org D6276607C1 Authentication-Results: smtp3.osuosl.org; dkim=pass (2048-bit key, unprotected) header.d=wuille.net header.i=@wuille.net header.a=rsa-sha256 header.s=protonmail header.b=I4kj6m60 X-Virus-Scanned: amavisd-new at osuosl.org X-Spam-Flag: NO X-Spam-Score: -0.203 X-Spam-Level: X-Spam-Status: No, score=-0.203 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nd0ciJs5FFxU for ; Mon, 10 Apr 2023 20:00:53 +0000 (UTC) X-Greylist: from auto-whitelisted by SQLgrey-1.8.0 DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org A7DEC606C0 Received: from mail-41104.protonmail.ch (mail-41104.protonmail.ch [185.70.41.104]) by smtp3.osuosl.org (Postfix) with ESMTPS id A7DEC606C0 for ; Mon, 10 Apr 2023 20:00:52 +0000 (UTC) Date: Mon, 10 Apr 2023 20:00:29 +0000 Authentication-Results: mail-41104.protonmail.ch; dkim=pass (2048-bit key) header.d=wuille.net header.i=@wuille.net header.b="I4kj6m60" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=wuille.net; s=protonmail; t=1681156840; x=1681416040; bh=xFisCMNSyzmy+1+Pt0JdYEusMOP1cMuwXue4q4wMVeI=; h=Date:To:From:Subject:Message-ID:Feedback-ID:From:To:Cc:Date: Subject:Reply-To:Feedback-ID:Message-ID:BIMI-Selector; b=I4kj6m60knR9nXGSqm11nCStNcOeTnUJmCx3IJ4jnxT+DgYBzaMfPWaILscJcloq/ idXm54a/8aLZVcz2kS2ub1iWq0QhFNNVUlXDrs+OBEWH0Lg+inPyslv4QDy4yaCMMO thnh1Ag4XafRDyDJ3cr3XyC82E9jHRdVAacZf4RCUBDMQW/XlbmOxD5c902kqK2Arm ynJYAZV0p2BDULMbmhXEhDJPQiiQSAhpHGaHK67JTWuRkYtekiRx4chl/75sE1RQoM LB5ta4GBy4VnpOqHsCHdP8+XOnU/+K8D2T8SMBp0JAwaIuKHztsWJbjF0TpKhw5j95 6JvmP7sn9hkTw== To: Bitcoin dev list From: Pieter Wuille Message-ID: Feedback-ID: 19463299:user:proton MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Mailman-Approved-At: Mon, 10 Apr 2023 20:27:39 +0000 Subject: [bitcoin-dev] libsecp256k1 v0.3.1 released X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 10 Apr 2023 20:00:55 -0000 Hello, Today we'd like to announce the release of version 0.3.1 of libsecp256k1: https://github.com/bitcoin-core/secp256k1/releases/tag/v0.3.1 This is a bugfix release after 0.3.0 (which was not announced on this list)= . For the full release notes of 0.3.0 and 0.3.1 see: https://github.com/bitcoin-core/secp256k1/blob/master/CHANGELOG.md but the impetus for this release is the discovery that Clang 14 and later b= ecame smart enough to optimize out a specific timing side-channel protectio= n mechanism in the code that could leave applications vulnerable to a side-= channel attack. This has been fixed in 0.3.1. We strongly recommend any users of the library to upgrade if their code may= end up being compiled with Clang 14+. Bitcoin Core release binaries are no= t affected. --=20 Pieter