[5/5] x86/speculation: Add Ivy Bridge to affected list
authorJosh Poimboeuf <jpoimboe@redhat.com>
Mon, 27 Apr 2020 18:46:13 +0000 (20:46 +0200)
committerBen Hutchings <benh@debian.org>
Tue, 9 Jun 2020 17:50:00 +0000 (18:50 +0100)
commit28e49a15e021a5eb91270ac6df29e7c4d844e763
treeaf858c48291b9d84679caa0483f5ec169f4bbbfe
parent60a03afb3918bfdf77d0c98b7325990e954e7646
[5/5] x86/speculation: Add Ivy Bridge to affected list

Origin: https://git.kernel.org/linus/3798cc4d106e91382bfe016caa2edada27c2bb3f
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2020-0543

Make the docs match the code.

Signed-off-by: Josh Poimboeuf <jpoimboe@redhat.com>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Gbp-Pq: Topic bugfix/x86/srbds
Gbp-Pq: Name 0005-x86-speculation-Add-Ivy-Bridge-to-affected-list.patch
Documentation/admin-guide/hw-vuln/special-register-buffer-data-sampling.rst