| Packages |
|
| Issues |
| + |
CVE-2022-0001 |
| + |
CVE-2022-0002 |
|
| Status |
|
| Severity |
|
| Affected |
|
| Fixed |
|
| Ticket |
|
| Advisory qualified |
|
| References |
| + |
https://github.com/archlinux/svntogit-packages/commit/88822ee46e0b1bdfadd8977341505c9f6541b006 |
| + |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html |
| + |
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html |
| + |
https://www.openwall.com/lists/oss-security/2022/03/18/2 |
|
| Notes |
| + |
haven't yet checked what other "managed runtimes in privileged modes" the SA might be refering to |
| + |
|
| + |
but unless there are any I think this is one of those cases where the fix was so long ago, nobody cares about the ASA anymore |
|