summaryrefslogtreecommitdiffstats
path: root/active/CVE-2020-12363
diff options
context:
space:
mode:
authorBen Hutchings <ben@decadent.org.uk>2022-02-25 02:54:22 +0100
committerBen Hutchings <ben@decadent.org.uk>2022-02-25 02:58:48 +0100
commit322eaf84fa0d24cdfa4acc99ff4a8d5635ab0654 (patch)
tree84cf09416b8cf27d0c1ac938e5332bc049c04d28 /active/CVE-2020-12363
parent4f1997da8949bfe55fdc4820e7def805bf3d4be8 (diff)
Fill in status for most issues
Diffstat (limited to 'active/CVE-2020-12363')
-rw-r--r--active/CVE-2020-1236320
1 files changed, 11 insertions, 9 deletions
diff --git a/active/CVE-2020-12363 b/active/CVE-2020-12363
index 10202ab2..218831be 100644
--- a/active/CVE-2020-12363
+++ b/active/CVE-2020-12363
@@ -1,4 +1,4 @@
-Description:
+Description: i915: Bad input validation in GuC firmware leading to DoS
References:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
Notes:
@@ -9,12 +9,14 @@ Notes:
carnil> firmware is required. The new firmware requires a kernel patch
carnil> https://git.kernel.org/linus/c784e5249e773689e38d2bc1749f08b986621a26
carnil> So might not be treaded as Linux issue itself.
+ bwh> Let's treat it as both firmware and kernel, similar to CPU issues
+ bwh> that need both microcode and kernel changes.
Bugs:
-upstream:
-5.10-upstream-stable:
-4.19-upstream-stable:
-4.9-upstream-stable:
-sid:
-5.10-bullseye-security:
-4.19-buster-security:
-4.9-stretch-security:
+upstream: released (5.11-rc1) [c784e5249e773689e38d2bc1749f08b986621a26]
+5.10-upstream-stable: needed
+4.19-upstream-stable: needed
+4.9-upstream-stable: needed
+sid: released (5.14.6-1)
+5.10-bullseye-security: needed
+4.19-buster-security: needed
+4.9-stretch-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy