diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2019-11-12 19:28:20 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2019-11-12 19:28:20 +0100 |
commit | e71106cc0b9ab299f7467f8d7aa7f6edae75dc15 (patch) | |
tree | 7608818f4e4d2356946d0b7e49c6afe097769926 /dsa-texts/4.19.67-2+deb10u2 | |
parent | bd80f991410e0c58ef3b9ef2fdb65216a161ea29 (diff) |
Update advisory for DSA 4564-1
Diffstat (limited to 'dsa-texts/4.19.67-2+deb10u2')
-rw-r--r-- | dsa-texts/4.19.67-2+deb10u2 | 26 |
1 files changed, 24 insertions, 2 deletions
diff --git a/dsa-texts/4.19.67-2+deb10u2 b/dsa-texts/4.19.67-2+deb10u2 index 88672973e..fb79efb78 100644 --- a/dsa-texts/4.19.67-2+deb10u2 +++ b/dsa-texts/4.19.67-2+deb10u2 @@ -1,3 +1,13 @@ +From: Salvatore Bonaccorso <carnil@debian.org> +To: debian-security-announce@lists.debian.org +Subject: [SECURITY] [DSA 4564-1] linux security update + +------------------------------------------------------------------------- +Debian Security Advisory DSA-4564-1 security@debian.org +https://www.debian.org/security/ Ben Hutchings +November 12, 2019 https://www.debian.org/security/faq +------------------------------------------------------------------------- + Package : linux CVE ID : CVE-2018-12207 CVE-2019-0154 CVE-2019-0155 CVE-2019-11135 @@ -25,7 +35,7 @@ CVE-2018-12207 A qemu update adding support for the PSCHANGE_MC_NO feature, which allows to disable iTLB Multihit mitigations in nested hypervisors - will be provided via DSA XXXX-1. + will be provided via DSA 4566-1. Intel's explanation of the issue can be found at <https://software.intel.com/security-software-guidance/insights/deep-dive-machine-check-error-avoidance-page-size-change-0>. @@ -74,7 +84,7 @@ CVE-2019-11135 For processors that are vulnerable to TAA but not MDS, this update disables TSX by default. This mitigation requires updated CPU microcode. An updated intel-microcode package (only available in - Debian non-free) will be provided via DSA XXXX-1. The updated CPU + Debian non-free) will be provided via DSA 4565-1. The updated CPU microcode may also be available as part of a system firmware ("BIOS") update. @@ -90,3 +100,15 @@ in version 4.9.189-3+deb9u2. For the stable distribution (buster), these problems have been fixed in version 4.19.67-2+deb10u2. + +We recommend that you upgrade your linux packages. + +For the detailed security status of linux please refer to its security +tracker page at: +https://security-tracker.debian.org/tracker/linux + +Further information about Debian Security Advisories, how to apply +these updates to your system and frequently asked questions can be +found at: https://www.debian.org/security/ + +Mailing list: debian-security-announce@lists.debian.org |