summaryrefslogtreecommitdiff
path: root/scripts/postinst-intercepts
diff options
context:
space:
mode:
authorKai Kang <kai.kang@windriver.com>2014-10-15 15:16:31 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2014-10-23 21:42:03 +0100
commit0692743b51f7daa0154fd4d8982236b4702ea2da (patch)
treefe51e588f34c521e5cd1e216785a658dc3d426d0 /scripts/postinst-intercepts
parent461e598815f8749bb26e97369e3b877f7ce749cf (diff)
downloadopenembedded-core-0692743b51f7daa0154fd4d8982236b4702ea2da.tar.gz
openembedded-core-0692743b51f7daa0154fd4d8982236b4702ea2da.tar.bz2
openembedded-core-0692743b51f7daa0154fd4d8982236b4702ea2da.zip
gnupg: CVE-2013-4242
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload. Patch from commit e2202ff2b704623efc6277fb5256e4e15bac5676 in git://git.gnupg.org/libgcrypt.git Signed-off-by: Yong Zhang <yong.zhang@windriver.com> Signed-off-by: Kai Kang <kai.kang@windriver.com>
Diffstat (limited to 'scripts/postinst-intercepts')
0 files changed, 0 insertions, 0 deletions