generic-poky/meta/recipes-support/gnupg/gnupg-1.4.7
Kai Kang 7a9f5c9120 gnupg: CVE-2013-4242
GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x
and possibly other products, allows local users to obtain private RSA
keys via a cache side-channel attack involving the L3 cache, aka
Flush+Reload.

Patch from commit e2202ff2b704623efc6277fb5256e4e15bac5676 in
git://git.gnupg.org/libgcrypt.git

(From OE-Core rev: d1e0f3e71ce9978ff0fc94d71e67b528dad84c5c)

Signed-off-by: Yong Zhang <yong.zhang@windriver.com>
Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2014-10-18 16:14:04 +02:00
..
CVE-2013-4242.patch gnupg: CVE-2013-4242 2014-10-18 16:14:04 +02:00
CVE-2013-4351.patch gnupg: CVE-2013-4351 2014-03-27 09:42:05 +00:00
CVE-2013-4576.patch gnupg: CVE-2013-4576 2014-03-27 09:42:05 +00:00
GnuPG1-CVE-2012-6085.patch gnupg: fix CVE-2012-6085 2013-02-15 12:17:35 +00:00
configure.patch gnupg: Update checksum, fix configure and compliation issues 2012-02-26 11:45:23 +00:00
curl_typeof_fix_backport.patch gnupg: Add missing patch for curl_typeof_fix 2012-02-28 12:27:46 +00:00
long-long-thumb.patch gnupg-1.4.7: Update Patch Info 2012-02-08 00:50:22 +00:00
mips_gcc4.4.patch gnupg-1.4.7: Update Patch Info 2012-02-08 00:50:22 +00:00