From mboxrd@z Thu Jan 1 00:00:00 1970 From: The IPFire Project To: ipfire-announce@lists.ipfire.org Subject: IPFire 2.23 - Core Update 138 released Date: Mon, 18 Nov 2019 19:19:44 +0000 Message-ID: MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============7762838058801844319==" List-Id: --===============7762838058801844319== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable https://blog.ipfire.org/post/ipfire-2-23-core-update-138-released Just days after the last one, we are releasing IPFire 2.23 - Core Update 137.= It addresses and mitigates recently announced vulnerabilities in Intel proce= ssors. Intel Vulnerabilities Intel has blessed us again with a variety of hardware vulnerabilities which n= eed to be mitigated in software. Unfortunately those will further decrease th= e performance of your IPFire systems due to changes in Intel's microcodes whi= ch are also shipped with this Core Update. If you would like to learn more about these vulnerabilities, please look here= [1], here [2], here [3], and here [4]. We recommend to install this update as quickly as possible to prevent your sy= stem from being exploited through these vulnerabilities. A reboot is required= to activate the changes. [1] https://mdsattacks.com/#ridl-ng [2] https://software.intel.com/security-software-guidance/software-guidance/i= ntel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort [3] https://software.intel.com/security-software-guidance/insights/deep-dive-= intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort [4] https://www.intel.com/content/dam/support/us/en/documents/processors/miti= gations-jump-conditional-code-erratum.pdf --===============7762838058801844319==--