summaryrefslogtreecommitdiffstats
path: root/dsa-texts/4.19.67-2+deb10u2
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2019-11-12 19:28:20 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2019-11-12 19:28:20 +0100
commite71106cc0b9ab299f7467f8d7aa7f6edae75dc15 (patch)
tree7608818f4e4d2356946d0b7e49c6afe097769926 /dsa-texts/4.19.67-2+deb10u2
parentbd80f991410e0c58ef3b9ef2fdb65216a161ea29 (diff)
Update advisory for DSA 4564-1
Diffstat (limited to 'dsa-texts/4.19.67-2+deb10u2')
-rw-r--r--dsa-texts/4.19.67-2+deb10u226
1 files changed, 24 insertions, 2 deletions
diff --git a/dsa-texts/4.19.67-2+deb10u2 b/dsa-texts/4.19.67-2+deb10u2
index 88672973..fb79efb7 100644
--- a/dsa-texts/4.19.67-2+deb10u2
+++ b/dsa-texts/4.19.67-2+deb10u2
@@ -1,3 +1,13 @@
+From: Salvatore Bonaccorso <carnil@debian.org>
+To: debian-security-announce@lists.debian.org
+Subject: [SECURITY] [DSA 4564-1] linux security update
+
+-------------------------------------------------------------------------
+Debian Security Advisory DSA-4564-1 security@debian.org
+https://www.debian.org/security/ Ben Hutchings
+November 12, 2019 https://www.debian.org/security/faq
+-------------------------------------------------------------------------
+
Package : linux
CVE ID : CVE-2018-12207 CVE-2019-0154 CVE-2019-0155 CVE-2019-11135
@@ -25,7 +35,7 @@ CVE-2018-12207
A qemu update adding support for the PSCHANGE_MC_NO feature, which
allows to disable iTLB Multihit mitigations in nested hypervisors
- will be provided via DSA XXXX-1.
+ will be provided via DSA 4566-1.
Intel's explanation of the issue can be found at
<https://software.intel.com/security-software-guidance/insights/deep-dive-machine-check-error-avoidance-page-size-change-0>.
@@ -74,7 +84,7 @@ CVE-2019-11135
For processors that are vulnerable to TAA but not MDS, this update
disables TSX by default. This mitigation requires updated CPU
microcode. An updated intel-microcode package (only available in
- Debian non-free) will be provided via DSA XXXX-1. The updated CPU
+ Debian non-free) will be provided via DSA 4565-1. The updated CPU
microcode may also be available as part of a system firmware
("BIOS") update.
@@ -90,3 +100,15 @@ in version 4.9.189-3+deb9u2.
For the stable distribution (buster), these problems have been fixed in
version 4.19.67-2+deb10u2.
+
+We recommend that you upgrade your linux packages.
+
+For the detailed security status of linux please refer to its security
+tracker page at:
+https://security-tracker.debian.org/tracker/linux
+
+Further information about Debian Security Advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: https://www.debian.org/security/
+
+Mailing list: debian-security-announce@lists.debian.org

© 2014-2024 Faster IT GmbH | imprint | privacy policy