git: 7c5ead6bb414 - main - security/vuxml: Document Intel CPU vulnerabilities
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 14 Aug 2024 14:22:16 UTC
The branch main has been updated by jrm: URL: https://cgit.FreeBSD.org/ports/commit/?id=7c5ead6bb4144f63f6da5de2fc35113aad884e25 commit 7c5ead6bb4144f63f6da5de2fc35113aad884e25 Author: Joseph Mingrone <jrm@FreeBSD.org> AuthorDate: 2024-08-14 13:55:55 +0000 Commit: Joseph Mingrone <jrm@FreeBSD.org> CommitDate: 2024-08-14 14:22:04 +0000 security/vuxml: Document Intel CPU vulnerabilities Security: CVE-2024-24853 Security: CVE-2024-25939 Security: CVE-2024-24980 Security: CVE-2023-42667 Security: CVE-2023-49141 Sponsored by: The FreeBSD Foundation --- security/vuxml/vuln/2024.xml | 63 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 63 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 2d7c55ef5028..be7d0c9ec59c 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,66 @@ + <vuln vid="9d8e9952-5a42-11ef-a219-1c697a616631"> + <topic>Intel CPUs -- multiple vulnerabilities</topic> + <affects> + <package> + <name>cpu-microcode-intel</name> + <range><lt>20240813</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Intel reports:</p> + <blockquote cite="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html"> + <p> + A potential security vulnerability in SMI Transfer monitor (STM) may + allow escalation of privilege. Intel has released microcode updates + to mitigate this potential vulnerability. + </p> + </blockquote> + <blockquote cite="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html"> + <p> + A potential security vulnerability in some 3rd Generation Intel Xeon + Scalable Processors may allow denial of service. Intel has released + microcode updates to mitigate this potential vulnerability. + </p> + </blockquote> + <blockquote cite="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html"> + <p> + A potential security vulnerability in some 3rd, 4th, and 5th + Generation Intel Xeon Processors may allow escalation of privilege. + Intel has released firmware updates to mitigate this potential + vulnerability. + </p> + </blockquote> + <blockquote cite="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html"> + <p> + A potential security vulnerability in the Intel Core Ultra Processor + stream cache mechanism may allow escalation of privilege. Intel has + released microcode updates to mitigate this potential vulnerability. + </p> + </blockquote> + <blockquote cite="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html"> + <p> + A potential security vulnerability in some Intel Processor stream + cache mechanisms may allow escalation of privilege. Intel has + released microcode updates to mitigate this potential vulnerability. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-24853</cvename> + <cvename>CVE-2024-25939</cvename> + <cvename>CVE-2024-24980</cvename> + <cvename>CVE-2023-42667</cvename> + <cvename>CVE-2023-49141</cvename> + <url>https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240813</url> + </references> + <dates> + <discovery>2024-08-13</discovery> + <entry>2024-08-14</entry> + </dates> + </vuln> + <vuln vid="5d7939f6-5989-11ef-9793-b42e991fc52e"> <topic>firefox -- multiple vulnerabilities</topic> <affects>