diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2023-08-25 23:01:53 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2023-08-25 23:01:53 +0200 |
commit | 87648c8d398a4583599bee0d30feff8e68e4c59d (patch) | |
tree | d74faf3a1c5e24efd84e850edeb5e360eda310b9 /active/CVE-2023-20588 | |
parent | b9ba66d10844c0946033f30130c9b9d9ea8e54a0 (diff) |
Note followup to CVE-2023-20588
Diffstat (limited to 'active/CVE-2023-20588')
-rw-r--r-- | active/CVE-2023-20588 | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/active/CVE-2023-20588 b/active/CVE-2023-20588 index 9af23fd62..788620254 100644 --- a/active/CVE-2023-20588 +++ b/active/CVE-2023-20588 @@ -2,9 +2,9 @@ Description: x86/CPU/AMD: Do not leak quotient data after a division by 0 References: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7007.html Notes: - carnil> For 6.4.y fixed as well in 6.4.10. + carnil> For 6.4.y fixed as well in 6.4.10. Followup in 6.4.12. Bugs: -upstream: released (6.5-rc6) [77245f1c3c6495521f6a3af082696ee2f8ce3921] +upstream: released (6.5-rc6) [77245f1c3c6495521f6a3af082696ee2f8ce3921], released (6.5-rc7) [f58d6fbcb7c848b7f2469be339bc571f2e9d245b] 6.1-upstream-stable: released (6.1.45) [f2615bb47be4f53be92c81a6a8aa286c92ef04d9] 5.10-upstream-stable: released (5.10.190) [b6fc2fbf89089ecfb8eb9a89a7fc91d444f4fec7] 4.19-upstream-stable: needed |