summaryrefslogtreecommitdiffstats
path: root/active/CVE-2023-20588
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2023-08-11 17:32:20 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2023-08-11 17:32:20 +0200
commitd962cad3092a341818d929dd3909d01e496a9833 (patch)
tree821e003433362f913b9a2741f9b9d20709d8fa29 /active/CVE-2023-20588
parent078368e6642129d6f164406fc65ea536f3914288 (diff)
Track fixes in 4.19.291, 5.10.190, 6.1.45 and 6.4.10
Diffstat (limited to 'active/CVE-2023-20588')
-rw-r--r--active/CVE-2023-205885
1 files changed, 3 insertions, 2 deletions
diff --git a/active/CVE-2023-20588 b/active/CVE-2023-20588
index 9a79c6c9..299d532d 100644
--- a/active/CVE-2023-20588
+++ b/active/CVE-2023-20588
@@ -2,10 +2,11 @@ Description: x86/CPU/AMD: Do not leak quotient data after a division by 0
References:
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7007.html
Notes:
+ carnil> For 6.4.y fixed as well in 6.4.10.
Bugs:
upstream: pending [77245f1c3c6495521f6a3af082696ee2f8ce3921]
-6.1-upstream-stable: needed
-5.10-upstream-stable: needed
+6.1-upstream-stable: released (6.1.45) [f2615bb47be4f53be92c81a6a8aa286c92ef04d9]
+5.10-upstream-stable: released (5.10.190) [b6fc2fbf89089ecfb8eb9a89a7fc91d444f4fec7]
4.19-upstream-stable: needed
sid: needed
6.1-bookworm-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy