From owner-svn-ports-all@FreeBSD.ORG Fri Jul 26 11:06:46 2013 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 4F48AD4C; Fri, 26 Jul 2013 11:06:46 +0000 (UTC) (envelope-from remko@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 239BF2279; Fri, 26 Jul 2013 11:06:46 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id r6QB6jbI095895; Fri, 26 Jul 2013 11:06:45 GMT (envelope-from remko@svn.freebsd.org) Received: (from remko@localhost) by svn.freebsd.org (8.14.7/8.14.5/Submit) id r6QB6jH3095894; Fri, 26 Jul 2013 11:06:45 GMT (envelope-from remko@svn.freebsd.org) Message-Id: <201307261106.r6QB6jH3095894@svn.freebsd.org> From: Remko Lodder Date: Fri, 26 Jul 2013 11:06:45 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r323712 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 26 Jul 2013 11:06:46 -0000 Author: remko (src,doc committer) Date: Fri Jul 26 11:06:44 2013 New Revision: 323712 URL: http://svnweb.freebsd.org/changeset/ports/323712 Log: Cleanup last entry. Properly indent the entry and make sure that after a period on the end of a line we follow with two spaces. hat: secteam Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Jul 26 10:46:37 2013 (r323711) +++ head/security/vuxml/vuln.xml Fri Jul 26 11:06:44 2013 (r323712) @@ -61,29 +61,30 @@ Note: Please add new entries to the beg -

Yarom and Falkner paper reports:

+

A Yarom and Falkner paper reports:

Flush+Reload is a cache side-channel attack that monitors access to - data in shared pages. In this paper we demonstrate how to use the - attack to extract private encryption keys from GnuPG. The high - resolution and low noise of the Flush+Reload attack enables a spy - program to recover over 98% of the bits of the private key in a - single decryption or signing round. Unlike previous attacks, the - attack targets the last level L3 cache. Consequently, the spy - program and the victim do not need to share the execution core of - the CPU. The attack is not limited to a traditional OS and can be - used in a virtualised environment, where it can attack programs - executing in a different VM..

+ data in shared pages. In this paper we demonstrate how to use the + attack to extract private encryption keys from GnuPG. The high + resolution and low noise of the Flush+Reload attack enables a spy + program to recover over 98% of the bits of the private key in a + single decryption or signing round. Unlike previous attacks, the + attack targets the last level L3 cache. Consequently, the spy + program and the victim do not need to share the execution core of + the CPU. The attack is not limited to a traditional OS and can be + used in a virtualised environment, where it can attack programs + executing in a different VM.

- http://eprint.iacr.org/2013/448 - http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html + http://eprint.iacr.org/2013/448 + http://lists.gnupg.org/pipermail/gnupg-announce/2013q3/000330.html 2013-07-18 2013-07-25 + 2013-07-26