Date: Fri, 26 Jul 2013 11:06:45 +0000 (UTC) From: Remko Lodder <remko@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r323712 - head/security/vuxml Message-ID: <201307261106.r6QB6jH3095894@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: remko (src,doc committer) Date: Fri Jul 26 11:06:44 2013 New Revision: 323712 URL: http://svnweb.freebsd.org/changeset/ports/323712 Log: Cleanup last entry. Properly indent the entry and make sure that after a period on the end of a line we follow with two spaces. hat: secteam Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Jul 26 10:46:37 2013 (r323711) +++ head/security/vuxml/vuln.xml Fri Jul 26 11:06:44 2013 (r323712) @@ -61,29 +61,30 @@ Note: Please add new entries to the beg </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Yarom and Falkner paper reports:</p> + <p>A Yarom and Falkner paper reports:</p> <blockquote cite="http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html"> <p>Flush+Reload is a cache side-channel attack that monitors access to - data in shared pages. In this paper we demonstrate how to use the - attack to extract private encryption keys from GnuPG. The high - resolution and low noise of the Flush+Reload attack enables a spy - program to recover over 98% of the bits of the private key in a - single decryption or signing round. Unlike previous attacks, the - attack targets the last level L3 cache. Consequently, the spy - program and the victim do not need to share the execution core of - the CPU. The attack is not limited to a traditional OS and can be - used in a virtualised environment, where it can attack programs - executing in a different VM..</p> + data in shared pages. In this paper we demonstrate how to use the + attack to extract private encryption keys from GnuPG. The high + resolution and low noise of the Flush+Reload attack enables a spy + program to recover over 98% of the bits of the private key in a + single decryption or signing round. Unlike previous attacks, the + attack targets the last level L3 cache. Consequently, the spy + program and the victim do not need to share the execution core of + the CPU. The attack is not limited to a traditional OS and can be + used in a virtualised environment, where it can attack programs + executing in a different VM.</p> </blockquote> </body> </description> <references> - <url>http://eprint.iacr.org/2013/448</url> - <url>http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html</url> + <url>http://eprint.iacr.org/2013/448</url> + <url>http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html</url> </references> <dates> <discovery>2013-07-18</discovery> <entry>2013-07-25</entry> + <modified>2013-07-26</modified> </dates> </vuln>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201307261106.r6QB6jH3095894>