summaryrefslogtreecommitdiffstats
path: root/active/CVE-2023-20588
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2023-08-25 23:01:53 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2023-08-25 23:01:53 +0200
commit87648c8d398a4583599bee0d30feff8e68e4c59d (patch)
treed74faf3a1c5e24efd84e850edeb5e360eda310b9 /active/CVE-2023-20588
parentb9ba66d10844c0946033f30130c9b9d9ea8e54a0 (diff)
Note followup to CVE-2023-20588
Diffstat (limited to 'active/CVE-2023-20588')
-rw-r--r--active/CVE-2023-205884
1 files changed, 2 insertions, 2 deletions
diff --git a/active/CVE-2023-20588 b/active/CVE-2023-20588
index 9af23fd62..788620254 100644
--- a/active/CVE-2023-20588
+++ b/active/CVE-2023-20588
@@ -2,9 +2,9 @@ Description: x86/CPU/AMD: Do not leak quotient data after a division by 0
References:
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7007.html
Notes:
- carnil> For 6.4.y fixed as well in 6.4.10.
+ carnil> For 6.4.y fixed as well in 6.4.10. Followup in 6.4.12.
Bugs:
-upstream: released (6.5-rc6) [77245f1c3c6495521f6a3af082696ee2f8ce3921]
+upstream: released (6.5-rc6) [77245f1c3c6495521f6a3af082696ee2f8ce3921], released (6.5-rc7) [f58d6fbcb7c848b7f2469be339bc571f2e9d245b]
6.1-upstream-stable: released (6.1.45) [f2615bb47be4f53be92c81a6a8aa286c92ef04d9]
5.10-upstream-stable: released (5.10.190) [b6fc2fbf89089ecfb8eb9a89a7fc91d444f4fec7]
4.19-upstream-stable: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy