summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2020-06-11 09:44:02 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2020-06-11 09:44:02 +0200
commit45370985a36a400ba8e84e813767a87e167244ab (patch)
tree52498146ffc13bfe3a3ce4bebd57dcb9c0a54065
parentdd97dc17c52fc7bf90b95e77240d537d0719cd11 (diff)
Update commit id tracking for CVE-202-0543
-rw-r--r--active/CVE-2020-05436
1 files changed, 3 insertions, 3 deletions
diff --git a/active/CVE-2020-0543 b/active/CVE-2020-0543
index 2edae664..abcc3421 100644
--- a/active/CVE-2020-0543
+++ b/active/CVE-2020-0543
@@ -8,9 +8,9 @@ Notes:
bwh> to allow disabling the mitigation where it is unneeded.
bwh> Embargoed until 2020-06-09 17:00 UTC.
Bugs:
-upstream: pending (5.8-rc1) [93920f61c2ad7edb01e63323832585796af75fc9, 7e5b3c267d256822407a22fdce6afdf9cd13f9fb, 7222a1b5b87417f22265c92deea76a6aecd0fb0f, 3798cc4d106e91382bfe016caa2edada27c2bb3f]
-4.19-upstream-stable: released (4.19.128) [6682fe2fca22e45153e69f5b7ce7282bcba3565f, b65105dc4242f949cea9264851ff5e5473434a91, 00c2119c632e04948677a941cbad2427b0666046, 79623df18eacf685c1ee4a1c4c185b3b92eb1167]
-4.9-upstream-stable: pending (4.9.227) [x86-cpu-add-a-steppings-field-to-struct-x86_cpu_id.patch, x86-cpu-add-table-argument-to-cpu_matches.patch, x86-speculation-add-special-register-buffer-data-sampling-srbds-mitigation.patch, x86-speculation-add-srbds-vulnerability-and-mitigation-documentation.patch, x86-speculation-add-ivy-bridge-to-affected-list.patch]
+upstream: pending (5.8-rc1) [e9d7144597b10ff13ff2264c059f7d4a7fbc89ac, 93920f61c2ad7edb01e63323832585796af75fc9, 7e5b3c267d256822407a22fdce6afdf9cd13f9fb, 7222a1b5b87417f22265c92deea76a6aecd0fb0f, 3798cc4d106e91382bfe016caa2edada27c2bb3f]
+4.19-upstream-stable: released (4.19.128) [253b9e7ac000154fc41b217660cb4c99f51e2ed0, 6682fe2fca22e45153e69f5b7ce7282bcba3565f, b65105dc4242f949cea9264851ff5e5473434a91, 00c2119c632e04948677a941cbad2427b0666046, 79623df18eacf685c1ee4a1c4c185b3b92eb1167]
+4.9-upstream-stable: released (4.9.227) [5f8f40583aad4aa3c0fc8a9adaa9f1c988fa8e9e, 15cf7ca9f59ff911cd5582969377bbf8c2ecab8a, 2f93f8d6891c2bd3963e1c68ad3eabf4dd6a55af, 2808035ba55eb8aaaf5eb37421dbfff37c1f25a8, 4798f72395eb523d251f18226527329debe353e9]
3.16-upstream-stable: pending (3.16.85) [x86-cpu-add-a-steppings-field-to-struct-x86_cpu_id.patch, x86-cpu-add-table-argument-to-cpu_matches.patch, x86-speculation-add-special-register-buffer-data-sampling-srbds-mitigation.patch, x86-speculation-add-srbds-vulnerability-and-mitigation-documentation.patch, x86-speculation-add-ivy-bridge-to-affected-list.patch]
sid: released (5.6.14-2) [bugfix/x86/srbds/0001-x86-cpu-Add-a-steppings-field-to-struct-x86_cpu_id.patch, bugfix/x86/srbds/0002-x86-cpu-Add-table-argument-to-cpu_matches.patch, bugfix/x86/srbds/0003-x86-speculation-Add-Special-Register-Buffer-Data-Sam.patch, bugfix/x86/srbds/0004-x86-speculation-Add-SRBDS-vulnerability-and-mitigati.patch, bugfix/x86/srbds/0005-x86-speculation-Add-Ivy-Bridge-to-affected-list.patch]
4.19-buster-security: released (4.19.118-2+deb10u1) [bugfix/x86/srbds/0001-x86-cpu-Add-a-steppings-field-to-struct-x86_cpu_id.patch, bugfix/x86/srbds/0002-x86-cpu-Add-table-argument-to-cpu_matches.patch, bugfix/x86/srbds/0003-x86-speculation-Add-Special-Register-Buffer-Data-Sam.patch, bugfix/x86/srbds/0004-x86-speculation-Add-SRBDS-vulnerability-and-mitigati.patch, bugfix/x86/srbds/0005-x86-speculation-Add-Ivy-Bridge-to-affected-list.patch]

© 2014-2024 Faster IT GmbH | imprint | privacy policy