diff options
author | Kai Kang <kai.kang@windriver.com> | 2014-10-15 15:16:31 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2014-10-23 21:43:15 +0100 |
commit | 313864bf528696a72c3ee6b3dec1a0c7b0b223f6 (patch) | |
tree | 4dc453e8e80aad12a3c1f1b9b8542a92ea2dcf07 /scripts/runqemu | |
parent | e93f9a838260100ece7cac36f01e42e321e6414b (diff) | |
download | poky-313864bf528696a72c3ee6b3dec1a0c7b0b223f6.tar.gz |
gnupg: CVE-2013-4242
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x
and possibly other products, allows local users to obtain private RSA
keys via a cache side-channel attack involving the L3 cache, aka
Flush+Reload.
Patch from commit e2202ff2b704623efc6277fb5256e4e15bac5676 in
git://git.gnupg.org/libgcrypt.git
(From OE-Core rev: 0692743b51f7daa0154fd4d8982236b4702ea2da)
Signed-off-by: Yong Zhang <yong.zhang@windriver.com>
Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'scripts/runqemu')
0 files changed, 0 insertions, 0 deletions