diff options
author | Kai Kang <kai.kang@windriver.com> | 2014-10-15 15:16:31 +0800 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2014-10-18 16:12:56 +0200 |
commit | d1e0f3e71ce9978ff0fc94d71e67b528dad84c5c (patch) | |
tree | 00a18f11b0cd62b1b0671356422ac6e0c7b56ed3 /meta/recipes-core/readline | |
parent | b145374c0a498de0160a9b81f50ce0066ab14862 (diff) | |
download | openembedded-core-d1e0f3e71ce9978ff0fc94d71e67b528dad84c5c.tar.gz openembedded-core-d1e0f3e71ce9978ff0fc94d71e67b528dad84c5c.tar.bz2 openembedded-core-d1e0f3e71ce9978ff0fc94d71e67b528dad84c5c.zip |
gnupg: CVE-2013-4242
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x
and possibly other products, allows local users to obtain private RSA
keys via a cache side-channel attack involving the L3 cache, aka
Flush+Reload.
Patch from commit e2202ff2b704623efc6277fb5256e4e15bac5676 in
git://git.gnupg.org/libgcrypt.git
Signed-off-by: Yong Zhang <yong.zhang@windriver.com>
Signed-off-by: Kai Kang <kai.kang@windriver.com>
Diffstat (limited to 'meta/recipes-core/readline')
0 files changed, 0 insertions, 0 deletions