Hi Adam,

> Anton, do you have any idea how widespread use of the existing stretch-
> backports package has been?

No, I do not have this information. If you are not sure - feel free to
reject this request.

Best regards

Anton


Am Do., 2. Juli 2020 um 22:14 Uhr schrieb Adam D. Barratt <
a...@adam-barratt.org.uk>:

> Apologies for letting this sit for a while.
>
> On Mon, 2020-03-23 at 18:08 -0300, Henrique de Moraes Holschuh wrote:
> > On Sat, 21 Mar 2020, Adam D. Barratt wrote:
> > > On Sun, 2020-03-15 at 21:37 +0100, Anton Gladky wrote:
> > > > I have prepared an update for amd64-microcode for Debian Stretch,
> > > > which fixes CVE-2017-5715. Please see an attached debdiff.
> > > >
> > > > This is the newer upstream version, which fixes CVE-2017-5715.
> > > > Security team marked this CVE for Stretch as <no-dsa> [1].
> > >
> > > Do you have any input / thoughts on this proposed update?
> >
> > The microcode might be safe enough, we don't have regressions
> > reported against the lastest one (which is just a revert by AMD of an
> > update that did cause regressions when not applied through UEFI).
> >
> > But that's with recent kernels.
> >
> > I have no idea about the kernel codepaths it might activate, though,
> > if new MSRs are exposed.
>
> I'm torn as to what to do with this request, given that we're about to
> hit the EOL point release for stretch.
>
> Anton, do you have any idea how widespread use of the existing stretch-
> backports package has been?
>
> Regards,
>
> Adam
>
>

Reply via email to