pygoscelis: Bump to 5.3.11-x240 (see also CVE-2019-11135)
Yay, intel lied again about security: - CVE-2019-11135 - https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort - German newspaper: https://www.golem.de/news/tsx-asynchronous-abort-taa-intel-verheimlichte-gravierende-xeon-sicherheitsluecke-1911-144944.html
This commit is contained in:
parent
450b058e31
commit
06a1c34423
@ -1,6 +1,6 @@
|
||||
#
|
||||
# Automatically generated file; DO NOT EDIT.
|
||||
# Linux/x86 5.3.10 Kernel Configuration
|
||||
# Linux/x86 5.3.11 Kernel Configuration
|
||||
#
|
||||
|
||||
#
|
||||
@ -428,6 +428,9 @@ CONFIG_X86_SMAP=y
|
||||
# CONFIG_X86_INTEL_UMIP is not set
|
||||
# CONFIG_X86_INTEL_MPX is not set
|
||||
# CONFIG_X86_INTEL_MEMORY_PROTECTION_KEYS is not set
|
||||
CONFIG_X86_INTEL_TSX_MODE_OFF=y
|
||||
# CONFIG_X86_INTEL_TSX_MODE_ON is not set
|
||||
# CONFIG_X86_INTEL_TSX_MODE_AUTO is not set
|
||||
CONFIG_EFI=y
|
||||
CONFIG_EFI_STUB=y
|
||||
# CONFIG_EFI_MIXED is not set
|
||||
|
Loading…
x
Reference in New Issue
Block a user