No Image

Announcing Windows 11 Insider Preview Build 22621.1972 and 22631.1972

2023-06-30 KENNETH 0

Announcing Windows 11 Insider Preview Build 22621.1972 and 22631.1972 Hello Windows Insiders, today we are releasing Windows 11 Insider Preview Build 22621.1972 and Build 22631.1972 (KB5027295) to the Beta Channel.   Build 22631.1972 = New features rolling out.  Build 22621.1972 = New features off by default.  REMINDER: Insiders who were previously on Build 22624 will automatically get moved to Build 22631 via an enablement package. The enablement package artificially increments the build number for the update with new features getting rolled out and turned on to make it easier to differentiate from devices with the update with features off by default. This approach is being used for the Beta Channel only and is not indicative of any changes or plans for final feature rollouts.  Insiders who landed in the group with new features turned off by default (Build 22621.1972) can check for [ more… ]

Announcing Windows 11 Insider Preview Build 23493

2023-06-30 KENNETH 0

Announcing Windows 11 Insider Preview Build 23493 Hello Windows Insiders, today we are releasing Windows 11 Insider Preview Build 23493 to the Dev Channel.   What’s new in Build 23493  Windows Copilot Preview  Back in May at the Build conference, we introduced Windows Copilot for Windows 11. In today’s flight we are offering an early look of Windows Copilot to Windows Insiders in the Dev Channel via a controlled feature rollout. This first preview focuses on our integrated UI experience, with additional functionality coming down the road in future previews. To use Copilot in this flight you must have Windows Build 23493 or higher in the Dev Channel, and Microsoft Edge version 115.0.1901.150 or higher.   To get started, just click on the new button on the taskbar (or WIN + C) to launch Windows Copilot. Windows Copilot will use the same [ more… ]

No Image

USN-6193-1: Linux kernel vulnerabilities

2023-06-29 KENNETH 0

USN-6193-1: Linux kernel vulnerabilities Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35788, LP: #2023577) It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information (kernel memory) or possibly cause undesired behaviors. (LP: #2023220) Source: USN-6193-1: Linux kernel vulnerabilities

No Image

USN-6192-1: Linux kernel vulnerabilities

2023-06-29 KENNETH 0

USN-6192-1: Linux kernel vulnerabilities Hangyu Hua discovered that the Flower classifier implementation in the Linux kernel contained an out-of-bounds write vulnerability. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-35788, LP: #2023577) Xingyuan Mo and Gengjia Chen discovered that the io_uring subsystem in the Linux kernel did not properly handle locking when IOPOLL mode is being used. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-2430) It was discovered that for some Intel processors the INVLPG instruction implementation did not properly flush global TLB entries when PCIDs are enabled. An attacker could use this to expose sensitive information (kernel memory) or possibly cause undesired behaviors. (LP: #2023220) Source: USN-6192-1: Linux kernel vulnerabilities

No Image

USN-6191-1: Linux kernel regression

2023-06-29 KENNETH 0

USN-6191-1: Linux kernel regression USN-6081-1, USN-6084-1, USN-6092-1 and USN-6095-1 fixed vulnerabilities in the Linux kernel. Unfortunately, that update introduced a spurious warning in the IPv6 subsystem. This update removes the undesired warning message. Source: USN-6191-1: Linux kernel regression