git: d72a8184c782 - main - security/vuxml: Document AMD CPU vulnerabilities
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sat, 10 Aug 2024 23:36:25 UTC
The branch main has been updated by jrm: URL: https://cgit.FreeBSD.org/ports/commit/?id=d72a8184c782e00f6023be8c240e3a2d8d8194d1 commit d72a8184c782e00f6023be8c240e3a2d8d8194d1 Author: Joseph Mingrone <jrm@FreeBSD.org> AuthorDate: 2024-08-10 23:02:15 +0000 Commit: Joseph Mingrone <jrm@FreeBSD.org> CommitDate: 2024-08-10 23:09:56 +0000 security/vuxml: Document AMD CPU vulnerabilities Security: CVE-2023-31315 Sponsored by: The FreeBSD Foundation --- security/vuxml/vuln/2024.xml | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 0564e3ef1330..0599afd6fff2 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,36 @@ + <vuln vid="7d631146-5769-11ef-b618-1c697a616631"> + <topic>AMD CPUs -- Guest Memory Vulnerabilities</topic> + <affects> + <package> + <name>cpu-microcode-amd</name> + <range><lt>20240810</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>AMD reports:</p> + <blockquote cite="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7014.html"> + <p> + Researchers from IOActive have reported that it may be possible for + an attacker with ring 0 access to modify the configuration of System + Management Mode (SMM) even when SMM Lock is enabled. Improper + validation in a model specific register (MSR) could allow a malicious + program with ring0 access to modify SMM configuration while SMI lock + is enabled, potentially leading to arbitrary code execution. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2023-31315</cvename> + <url>https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7014.html</url> + </references> + <dates> + <discovery>2024-08-09</discovery> + <entry>2024-08-10</entry> + </dates> + </vuln> + <vuln vid="5776cc4f-5717-11ef-b611-84a93843eb75"> <topic>Roundcube -- Multiple vulnerabilities</topic> <affects>