X-Recipient: archive-cygwin AT delorie DOT com DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:reply-to:to:from:subject:message-id:date :mime-version:content-type:content-transfer-encoding; q=dns; s= default; b=EPZEQWQd9I0V6dVTcdNbnkCRDcRQpIK0YARx8ZuEc9obvthbm71Rd MFTnyqpGTxZt4tgZEB+//7vJqnaPee5XHi9xJTHAVCT5fm4HfiuPYEecoojZzzhF pMJrpjSuplNSl9Ix9epYngxUj4h7gRLqV4l+BcyxRisAqxngUOUSq0= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:reply-to:to:from:subject:message-id:date :mime-version:content-type:content-transfer-encoding; s=default; bh=+KhdEiq1NO/XXmKGzfG7j6WFc54=; b=TXL6VKSj0cfvTHM/lY7kboIbqDa3 lHg1CDgSur5AHhoaiA8P4KbkNj2RbVgdHckS5z/0BIqq7cxzvwFbmULhHmMm2NAB a137rozpj6dz7xFK6oEIqgAe2IVWENIUS01e30gb48Byo6SMYF2nGnsNW/L9ACNT X1E74KxpoH9L7rs= Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-owner AT cygwin DOT com Mail-Followup-To: cygwin AT cygwin DOT com Delivered-To: mailing list cygwin AT cygwin DOT com Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-0.2 required=5.0 tests=AWL,BAYES_40,KAM_LAZY_DOMAIN_SECURITY,RCVD_IN_DNSWL_LOW autolearn=no version=3.3.2 spammy=calgary, H*RU:!192.168.1.100!, H*r:ip*192.168.1.100, Hx-spam-relays-external:!192.168.1.100! X-HELO: smtp-out-so.shaw.ca X-Authority-Analysis: v=2.2 cv=NKylwwyg c=1 sm=1 tr=0 a=MVEHjbUiAHxQW0jfcDq5EA==:117 a=MVEHjbUiAHxQW0jfcDq5EA==:17 a=N659UExz7-8A:10 a=w5aJ8kaLLAry8Qfnm_kA:9 a=pILNOxqGKmIA:10 Reply-To: Brian DOT Inglis AT SystematicSw DOT ab DOT ca To: cygwin AT cygwin DOT com From: Brian Inglis Subject: Upstream Spectre CVE Patch Availability Message-ID: Date: Thu, 18 Jan 2018 18:45:52 -0700 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.5.2 MIME-Version: 1.0 Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-CMAE-Envelope: MS4wfGakGZsMvadxMre3BYSIoVdXmY1z2e7WX1H22nq4XDxwZsNYjSomJnOUsZof4S8+8wWkfjGPnj+oB0rb9RMLLtdak/Y2BICNq6MFPjQwkIhqeQ5RFXqg 76IjNe5z14k4vzaZ+7miSs5au12QMdGO3WwgMXbbh4/np6J1Gdj9CDhO8LqMMIC2mNh6jhCL0qgGow== X-IsSubscribed: yes Hi folks, Not seen any posts here about the monster in the chip yet (although those who might know may be busy dealing with the issues in their jobs), so has anyone any idea if or when we might see upstream Spectre CVE patches available for the following packages, whose bases have been mentioned in the many articles published recently, and has anyone seen mention of any other packages likely to be affected? cygwin32-gcc-core 6.4.0-1 djgpp-gcc-core 5.4.0-1 gcc-core 6.4.0-4 libjavascriptcoregtk3.0_0 2.0.4-5 libvirt-common 3.6.0-1 libwebkitgtk3.0_0 2.0.4-5 mingw64-i686-gcc-core 6.4.0-1 mingw64-x86_64-gcc-core 6.4.0-2 -- Take care. Thanks, Brian Inglis, Calgary, Alberta, Canada -- Problem reports: http://cygwin.com/problems.html FAQ: http://cygwin.com/faq/ Documentation: http://cygwin.com/docs.html Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple