diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2023-07-24 22:07:56 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2023-07-25 01:06:05 +0200 |
commit | 55547848f429c00f47fdb58a5b0a6d1e7eed6c6d (patch) | |
tree | 03a7fcc202fe329ed22772bb8f156318cb57920d /kernels/VERSIONS.TXT | |
parent | 84730d7abad295f83f3a923170248e19b2afb375 (diff) | |
download | current-55547848f429c00f47fdb58a5b0a6d1e7eed6c6d.tar.gz current-55547848f429c00f47fdb58a5b0a6d1e7eed6c6d.tar.xz |
Mon Jul 24 22:07:56 UTC 202320230724220756
a/kernel-firmware-20230724_59fbffa-noarch-1.txz: Upgraded.
AMD microcode updated to fix a use-after-free in AMD Zen2 processors.
From Tavis Ormandy's annoucement of the issue:
"The practical result here is that you can spy on the registers of other
processes. No system calls or privileges are required.
It works across virtual machines and affects all operating systems.
I have written a poc for this issue that's fast enough to reconstruct
keys and passwords as users log in."
For more information, see:
https://seclists.org/oss-sec/2023/q3/59
https://www.cve.org/CVERecord?id=CVE-2023-20593
(* Security fix *)
a/kernel-generic-6.1.41-x86_64-1.txz: Upgraded.
a/kernel-huge-6.1.41-x86_64-1.txz: Upgraded.
a/kernel-modules-6.1.41-x86_64-1.txz: Upgraded.
d/kernel-headers-6.1.41-x86-1.txz: Upgraded.
k/kernel-source-6.1.41-noarch-1.txz: Upgraded.
isolinux/initrd.img: Rebuilt.
kernels/*: Upgraded.
usb-and-pxe-installers/usbboot.img: Rebuilt.
Diffstat (limited to 'kernels/VERSIONS.TXT')
-rw-r--r-- | kernels/VERSIONS.TXT | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/kernels/VERSIONS.TXT b/kernels/VERSIONS.TXT index 02de7b237..37174c518 100644 --- a/kernels/VERSIONS.TXT +++ b/kernels/VERSIONS.TXT @@ -1,3 +1,3 @@ -These kernels are version 6.1.40. +These kernels are version 6.1.41. |