From owner-svn-ports-all@FreeBSD.ORG Fri Jul 26 11:06:46 2013
Return-Path:
Delivered-To: svn-ports-all@freebsd.org
Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115])
(using TLSv1 with cipher ADH-AES256-SHA (256/256 bits))
(No client certificate requested)
by hub.freebsd.org (Postfix) with ESMTP id 4F48AD4C;
Fri, 26 Jul 2013 11:06:46 +0000 (UTC)
(envelope-from remko@FreeBSD.org)
Received: from svn.freebsd.org (svn.freebsd.org
[IPv6:2001:1900:2254:2068::e6a:0])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by mx1.freebsd.org (Postfix) with ESMTPS id 239BF2279;
Fri, 26 Jul 2013 11:06:46 +0000 (UTC)
Received: from svn.freebsd.org ([127.0.1.70])
by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id r6QB6jbI095895;
Fri, 26 Jul 2013 11:06:45 GMT (envelope-from remko@svn.freebsd.org)
Received: (from remko@localhost)
by svn.freebsd.org (8.14.7/8.14.5/Submit) id r6QB6jH3095894;
Fri, 26 Jul 2013 11:06:45 GMT (envelope-from remko@svn.freebsd.org)
Message-Id: <201307261106.r6QB6jH3095894@svn.freebsd.org>
From: Remko Lodder
Date: Fri, 26 Jul 2013 11:06:45 +0000 (UTC)
To: ports-committers@freebsd.org, svn-ports-all@freebsd.org,
svn-ports-head@freebsd.org
Subject: svn commit: r323712 - head/security/vuxml
X-SVN-Group: ports-head
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-BeenThere: svn-ports-all@freebsd.org
X-Mailman-Version: 2.1.14
Precedence: list
List-Id: SVN commit messages for the ports tree
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
X-List-Received-Date: Fri, 26 Jul 2013 11:06:46 -0000
Author: remko (src,doc committer)
Date: Fri Jul 26 11:06:44 2013
New Revision: 323712
URL: http://svnweb.freebsd.org/changeset/ports/323712
Log:
Cleanup last entry. Properly indent the entry and
make sure that after a period on the end of a line
we follow with two spaces.
hat: secteam
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Fri Jul 26 10:46:37 2013 (r323711)
+++ head/security/vuxml/vuln.xml Fri Jul 26 11:06:44 2013 (r323712)
@@ -61,29 +61,30 @@ Note: Please add new entries to the beg
- Yarom and Falkner paper reports:
+ A Yarom and Falkner paper reports:
Flush+Reload is a cache side-channel attack that monitors access to
- data in shared pages. In this paper we demonstrate how to use the
- attack to extract private encryption keys from GnuPG. The high
- resolution and low noise of the Flush+Reload attack enables a spy
- program to recover over 98% of the bits of the private key in a
- single decryption or signing round. Unlike previous attacks, the
- attack targets the last level L3 cache. Consequently, the spy
- program and the victim do not need to share the execution core of
- the CPU. The attack is not limited to a traditional OS and can be
- used in a virtualised environment, where it can attack programs
- executing in a different VM..
+ data in shared pages. In this paper we demonstrate how to use the
+ attack to extract private encryption keys from GnuPG. The high
+ resolution and low noise of the Flush+Reload attack enables a spy
+ program to recover over 98% of the bits of the private key in a
+ single decryption or signing round. Unlike previous attacks, the
+ attack targets the last level L3 cache. Consequently, the spy
+ program and the victim do not need to share the execution core of
+ the CPU. The attack is not limited to a traditional OS and can be
+ used in a virtualised environment, where it can attack programs
+ executing in a different VM.
- http://eprint.iacr.org/2013/448
- http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html
+ http://eprint.iacr.org/2013/448
+ http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html
2013-07-18
2013-07-25
+ 2013-07-26