summaryrefslogtreecommitdiffstats
path: root/kernels/VERSIONS.TXT
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2023-07-24 22:07:56 +0000
committer Eric Hameleers <alien@slackware.com>2023-07-25 01:06:05 +0200
commit55547848f429c00f47fdb58a5b0a6d1e7eed6c6d (patch)
tree03a7fcc202fe329ed22772bb8f156318cb57920d /kernels/VERSIONS.TXT
parent84730d7abad295f83f3a923170248e19b2afb375 (diff)
downloadcurrent-55547848f429c00f47fdb58a5b0a6d1e7eed6c6d.tar.gz
current-55547848f429c00f47fdb58a5b0a6d1e7eed6c6d.tar.xz
Mon Jul 24 22:07:56 UTC 202320230724220756
a/kernel-firmware-20230724_59fbffa-noarch-1.txz: Upgraded. AMD microcode updated to fix a use-after-free in AMD Zen2 processors. From Tavis Ormandy's annoucement of the issue: "The practical result here is that you can spy on the registers of other processes. No system calls or privileges are required. It works across virtual machines and affects all operating systems. I have written a poc for this issue that's fast enough to reconstruct keys and passwords as users log in." For more information, see: https://seclists.org/oss-sec/2023/q3/59 https://www.cve.org/CVERecord?id=CVE-2023-20593 (* Security fix *) a/kernel-generic-6.1.41-x86_64-1.txz: Upgraded. a/kernel-huge-6.1.41-x86_64-1.txz: Upgraded. a/kernel-modules-6.1.41-x86_64-1.txz: Upgraded. d/kernel-headers-6.1.41-x86-1.txz: Upgraded. k/kernel-source-6.1.41-noarch-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'kernels/VERSIONS.TXT')
-rw-r--r--kernels/VERSIONS.TXT2
1 files changed, 1 insertions, 1 deletions
diff --git a/kernels/VERSIONS.TXT b/kernels/VERSIONS.TXT
index 02de7b237..37174c518 100644
--- a/kernels/VERSIONS.TXT
+++ b/kernels/VERSIONS.TXT
@@ -1,3 +1,3 @@
-These kernels are version 6.1.40.
+These kernels are version 6.1.41.