Changes

6 bytes removed ,  08:05, 15 August 2019
versioning
Line 262: Line 262:  
This is mostly useless in practice, given the general availability of other exploits to obtain these decrypted exponents.
 
This is mostly useless in practice, given the general availability of other exploits to obtain these decrypted exponents.
 
| With userland privileges sufficient to use an imported RSA key: obtaining that RSA key's private exponent.
 
| With userland privileges sufficient to use an imported RSA key: obtaining that RSA key's private exponent.
[[8.0.0]]
+
N/A
|  [[8.0.0]]
+
|  [[8.1.0]]
 
|  August 14, 2019
 
|  August 14, 2019
 
|  August 14, 2019
 
|  August 14, 2019