From 2c4b85f17d5be4ef479402b9fbf18f22522dced7 Mon Sep 17 00:00:00 2001 From: Ben Hutchings Date: Mon, 11 Mar 2024 00:14:13 +0100 Subject: Mark CVE-2023-3640 as ignored in all suites This issue seems to be a known and unfixable limitation to Meltdown mitigation on x86. --- active/CVE-2023-3640 | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/active/CVE-2023-3640 b/active/CVE-2023-3640 index a4e128ec..c53a1b51 100644 --- a/active/CVE-2023-3640 +++ b/active/CVE-2023-3640 @@ -6,11 +6,11 @@ Notes: bwh> effect of Meltdown and not a new issue. There's no claim that kernel bwh> memory outside of the entry area can be read. Bugs: -upstream: -6.1-upstream-stable: -5.10-upstream-stable: -4.19-upstream-stable: -sid: -6.1-bookworm-security: -5.10-bullseye-security: -4.19-buster-security: +upstream: ignored "Unfixable CPU issue" +6.1-upstream-stable: ignored "Unfixable CPU issue" +5.10-upstream-stable: ignored "Unfixable CPU issue" +4.19-upstream-stable: ignored "Unfixable CPU issue" +sid: ignored "Unfixable CPU issue" +6.1-bookworm-security: ignored "Unfixable CPU issue" +5.10-bullseye-security: ignored "Unfixable CPU issue" +4.19-buster-security: ignored "Unfixable CPU issue" -- cgit v1.2.3