From e71106cc0b9ab299f7467f8d7aa7f6edae75dc15 Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Tue, 12 Nov 2019 19:28:20 +0100 Subject: Update advisory for DSA 4564-1 --- dsa-texts/4.19.67-2+deb10u2 | 26 ++++++++++++++++++++++++-- 1 file changed, 24 insertions(+), 2 deletions(-) (limited to 'dsa-texts/4.19.67-2+deb10u2') diff --git a/dsa-texts/4.19.67-2+deb10u2 b/dsa-texts/4.19.67-2+deb10u2 index 88672973..fb79efb7 100644 --- a/dsa-texts/4.19.67-2+deb10u2 +++ b/dsa-texts/4.19.67-2+deb10u2 @@ -1,3 +1,13 @@ +From: Salvatore Bonaccorso +To: debian-security-announce@lists.debian.org +Subject: [SECURITY] [DSA 4564-1] linux security update + +------------------------------------------------------------------------- +Debian Security Advisory DSA-4564-1 security@debian.org +https://www.debian.org/security/ Ben Hutchings +November 12, 2019 https://www.debian.org/security/faq +------------------------------------------------------------------------- + Package : linux CVE ID : CVE-2018-12207 CVE-2019-0154 CVE-2019-0155 CVE-2019-11135 @@ -25,7 +35,7 @@ CVE-2018-12207 A qemu update adding support for the PSCHANGE_MC_NO feature, which allows to disable iTLB Multihit mitigations in nested hypervisors - will be provided via DSA XXXX-1. + will be provided via DSA 4566-1. Intel's explanation of the issue can be found at . @@ -74,7 +84,7 @@ CVE-2019-11135 For processors that are vulnerable to TAA but not MDS, this update disables TSX by default. This mitigation requires updated CPU microcode. An updated intel-microcode package (only available in - Debian non-free) will be provided via DSA XXXX-1. The updated CPU + Debian non-free) will be provided via DSA 4565-1. The updated CPU microcode may also be available as part of a system firmware ("BIOS") update. @@ -90,3 +100,15 @@ in version 4.9.189-3+deb9u2. For the stable distribution (buster), these problems have been fixed in version 4.19.67-2+deb10u2. + +We recommend that you upgrade your linux packages. + +For the detailed security status of linux please refer to its security +tracker page at: +https://security-tracker.debian.org/tracker/linux + +Further information about Debian Security Advisories, how to apply +these updates to your system and frequently asked questions can be +found at: https://www.debian.org/security/ + +Mailing list: debian-security-announce@lists.debian.org -- cgit v1.2.3