From c4b6437838213888126c83b3f6dc628cdd6cab19 Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Tue, 12 Nov 2019 18:45:34 +0100 Subject: Separate DSA number by space --- dsa-texts/4.19.67-2+deb10u2 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'dsa-texts/4.19.67-2+deb10u2') diff --git a/dsa-texts/4.19.67-2+deb10u2 b/dsa-texts/4.19.67-2+deb10u2 index 834e9218..fce9213d 100644 --- a/dsa-texts/4.19.67-2+deb10u2 +++ b/dsa-texts/4.19.67-2+deb10u2 @@ -74,7 +74,7 @@ CVE-2019-11135 For processors that are vulnerable to TAA but not MDS, this update disables TSX by default. This mitigation requires updated CPU microcode. An updated intel-microcode package (only available in - Debian non-free) will be provided via DSA-XXXX-1. The updated CPU + Debian non-free) will be provided via DSA XXXX-1. The updated CPU microcode may also be available as part of a system firmware ("BIOS") update. -- cgit v1.2.3