diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2023-08-11 17:32:20 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2023-08-11 17:32:20 +0200 |
commit | d962cad3092a341818d929dd3909d01e496a9833 (patch) | |
tree | 821e003433362f913b9a2741f9b9d20709d8fa29 /active/CVE-2023-20588 | |
parent | 078368e6642129d6f164406fc65ea536f3914288 (diff) |
Track fixes in 4.19.291, 5.10.190, 6.1.45 and 6.4.10
Diffstat (limited to 'active/CVE-2023-20588')
-rw-r--r-- | active/CVE-2023-20588 | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/active/CVE-2023-20588 b/active/CVE-2023-20588 index 9a79c6c9..299d532d 100644 --- a/active/CVE-2023-20588 +++ b/active/CVE-2023-20588 @@ -2,10 +2,11 @@ Description: x86/CPU/AMD: Do not leak quotient data after a division by 0 References: https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7007.html Notes: + carnil> For 6.4.y fixed as well in 6.4.10. Bugs: upstream: pending [77245f1c3c6495521f6a3af082696ee2f8ce3921] -6.1-upstream-stable: needed -5.10-upstream-stable: needed +6.1-upstream-stable: released (6.1.45) [f2615bb47be4f53be92c81a6a8aa286c92ef04d9] +5.10-upstream-stable: released (5.10.190) [b6fc2fbf89089ecfb8eb9a89a7fc91d444f4fec7] 4.19-upstream-stable: needed sid: needed 6.1-bookworm-security: needed |