X-Recipient: archive-cygwin@delorie.com
DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id
	:list-unsubscribe:list-subscribe:list-archive:list-post
	:list-help:sender:reply-to:to:from:subject:message-id:date
	:mime-version:content-type:content-transfer-encoding; q=dns; s=
	default; b=EPZEQWQd9I0V6dVTcdNbnkCRDcRQpIK0YARx8ZuEc9obvthbm71Rd
	MFTnyqpGTxZt4tgZEB+//7vJqnaPee5XHi9xJTHAVCT5fm4HfiuPYEecoojZzzhF
	pMJrpjSuplNSl9Ix9epYngxUj4h7gRLqV4l+BcyxRisAqxngUOUSq0=
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id
	:list-unsubscribe:list-subscribe:list-archive:list-post
	:list-help:sender:reply-to:to:from:subject:message-id:date
	:mime-version:content-type:content-transfer-encoding; s=default;
	 bh=+KhdEiq1NO/XXmKGzfG7j6WFc54=; b=TXL6VKSj0cfvTHM/lY7kboIbqDa3
	lHg1CDgSur5AHhoaiA8P4KbkNj2RbVgdHckS5z/0BIqq7cxzvwFbmULhHmMm2NAB
	a137rozpj6dz7xFK6oEIqgAe2IVWENIUS01e30gb48Byo6SMYF2nGnsNW/L9ACNT
	X1E74KxpoH9L7rs=
Mailing-List: contact cygwin-help@cygwin.com; run by ezmlm
List-Id: <cygwin.cygwin.com>
List-Subscribe: <mailto:cygwin-subscribe@cygwin.com>
List-Archive: <http://sourceware.org/ml/cygwin/>
List-Post: <mailto:cygwin@cygwin.com>
List-Help: <mailto:cygwin-help@cygwin.com>, <http://sourceware.org/ml/#faqs>
Sender: cygwin-owner@cygwin.com
Mail-Followup-To: cygwin@cygwin.com
Delivered-To: mailing list cygwin@cygwin.com
Authentication-Results: sourceware.org; auth=none
X-Virus-Found: No
X-Spam-SWARE-Status: No, score=-0.2 required=5.0 tests=AWL,BAYES_40,KAM_LAZY_DOMAIN_SECURITY,RCVD_IN_DNSWL_LOW autolearn=no version=3.3.2 spammy=calgary, H*RU:!192.168.1.100!, H*r:ip*192.168.1.100, Hx-spam-relays-external:!192.168.1.100!
X-HELO: smtp-out-so.shaw.ca
X-Authority-Analysis: v=2.2 cv=NKylwwyg c=1 sm=1 tr=0 a=MVEHjbUiAHxQW0jfcDq5EA==:117 a=MVEHjbUiAHxQW0jfcDq5EA==:17 a=N659UExz7-8A:10 a=w5aJ8kaLLAry8Qfnm_kA:9 a=pILNOxqGKmIA:10
Reply-To: Brian.Inglis@SystematicSw.ab.ca
To: cygwin@cygwin.com
From: Brian Inglis <Brian.Inglis@SystematicSw.ab.ca>
Subject: Upstream Spectre CVE Patch Availability
Message-ID: <d68cd57a-2de5-ddcb-0654-473d1713e260@SystematicSw.ab.ca>
Date: Thu, 18 Jan 2018 18:45:52 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.5.2
MIME-Version: 1.0
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: 7bit
X-CMAE-Envelope: MS4wfGakGZsMvadxMre3BYSIoVdXmY1z2e7WX1H22nq4XDxwZsNYjSomJnOUsZof4S8+8wWkfjGPnj+oB0rb9RMLLtdak/Y2BICNq6MFPjQwkIhqeQ5RFXqg 76IjNe5z14k4vzaZ+7miSs5au12QMdGO3WwgMXbbh4/np6J1Gdj9CDhO8LqMMIC2mNh6jhCL0qgGow==
X-IsSubscribed: yes

Hi folks,

Not seen any posts here about the monster in the chip yet (although those who
might know may be busy dealing with the issues in their jobs), so has anyone any
idea if or when we might see upstream Spectre CVE patches available for the
following packages, whose bases have been mentioned in the many articles
published recently, and has anyone seen mention of any other packages likely to
be affected?

cygwin32-gcc-core 6.4.0-1
djgpp-gcc-core 5.4.0-1
gcc-core 6.4.0-4
libjavascriptcoregtk3.0_0 2.0.4-5
libvirt-common 3.6.0-1
libwebkitgtk3.0_0 2.0.4-5
mingw64-i686-gcc-core 6.4.0-1
mingw64-x86_64-gcc-core 6.4.0-2

-- 
Take care. Thanks, Brian Inglis, Calgary, Alberta, Canada

--
Problem reports:       http://cygwin.com/problems.html
FAQ:                   http://cygwin.com/faq/
Documentation:         http://cygwin.com/docs.html
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple

