From nobody Tue Nov 12 19:56:30 2024 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Xnxxq0yl7z5cWX1; Tue, 12 Nov 2024 19:56:31 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Xnxxq0NR5z44n1; Tue, 12 Nov 2024 19:56:31 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1731441391; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=44blt5kKx3vntSvhMykHFWW/KAwjcEzDyilaiYgthWQ=; b=htmA7+p0QaKILktQNdnL0oxm7rwJ1ap2l+xMDqGu9aS+w6y6n978Vrpd2nvY4x8CmZ1oTq pSyMrMwHgLSVRGBAflcwBIEH0AAVpg6O7VtrCxLGCU7tWBRE+nVD0i7ucX/iJ5aiKwLQRS 7d3aQa9vV5pMs8qr//6ruxe0y1m4wVBN4q2k+v2Z4UREnwBC+mvlaILHdOfRFcGO/v20XI 64mHdwcT3WW94lyRE7GRqE4ZkYQMr7TtJpRiiX8Rr5gyu47SMn3jGPx1bwSLBOC8PBoj/z fEc4GShq3M5oeMujc5u2QKSn3ka4RLBOMKBZi208tPiZ5haOH/wvg/NinH0ZxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1731441391; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=44blt5kKx3vntSvhMykHFWW/KAwjcEzDyilaiYgthWQ=; b=pqse7S8ufgVZY0kBVml8m+0xB9G2cQ2/CckJ0PuWrW3tRnC8GWmK4AiZ5JpRFCtfoWGJnv oYtQEl1nQhLLPi1vxHfa2SEJrxUbRIR47XoCADBmYMhEY2Dy4wGpLRmMw5VPt3Rnq98S56 7D1YgbMND661Ex2cd3BwWt1LM1WxRZhahrhRHCG1cFnQARRf8HMQWZbjKPKwWF/Hesf54l 3xHZrP9/MnOi6sECiEMXlSkmP/gjZ1me3RvK9FWsZhAcaQ77U4mY9aKy2o3ICH4UErdAJ6 YrCF1Mg9tg7wM1F1RTYMmWgFHuknsFOL1YOf+oXESRE8VJFXNj4PbBUFiOWSNA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1731441391; a=rsa-sha256; cv=none; b=vX3nsklIz4o0nRzW9olahYyswJN2u6YDdXSd2EhCTXVebDagpqL37fT0orE1KPmgfQtnCS FU2e7xXlsODfUXtPzydDGNipC3LhwFyzlJtr/j0SDjXo7shblSsOYD/bVp2kVMu/wrB/45 qYRHnxz60MJsKcVQcZH0OzaywK7g6JI1TaKXeBs5xMCnUtwAJxi0zXnl7OsdKQVTedQ/Ss aPEh3d+FhRViHMA/R5wOPdxeAMTfWWcSzD8jxeDuW7Ayh2jW8CNXRMi9jFvPAbmJC8szdR +Kt6KeegueDFcz8d0zD1MVKHIIRV+S/a8P03zyre9CDS5vLMw24UrI1AKoixBg== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Xnxxq00g6zP7G; Tue, 12 Nov 2024 19:56:31 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.18.1/8.18.1) with ESMTP id 4ACJuUZW010848; Tue, 12 Nov 2024 19:56:30 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.18.1/8.18.1/Submit) id 4ACJuUcA010846; Tue, 12 Nov 2024 19:56:30 GMT (envelope-from git) Date: Tue, 12 Nov 2024 19:56:30 GMT Message-Id: <202411121956.4ACJuUcA010846@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Joseph Mingrone Subject: git: af75177d4a72 - main - security/vuxml: Document new Intel CPU vulnerabilities List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-ports-main@freebsd.org Sender: owner-dev-commits-ports-main@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: jrm X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: af75177d4a7278472fb1c15d58d09131808618b9 Auto-Submitted: auto-generated The branch main has been updated by jrm: URL: https://cgit.FreeBSD.org/ports/commit/?id=af75177d4a7278472fb1c15d58d09131808618b9 commit af75177d4a7278472fb1c15d58d09131808618b9 Author: Joseph Mingrone AuthorDate: 2024-11-12 19:42:02 +0000 Commit: Joseph Mingrone CommitDate: 2024-11-12 19:50:39 +0000 security/vuxml: Document new Intel CPU vulnerabilities Intel has disclosed new CPU vulnerabilities in the release notes for microcode-20241112. This release also includes updates to previous microcode updates for CVE-2024-24968 and CVE-2024-23984. Reference: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112 Security: CVE-2024-21820 Security: CVE-2024-21853 Security: CVE-2024-23918 Security: CVE-2024-23984 (updated microcode) Security: CVE-2024-24968 (updated microcode) Sponsored by: The FreeBSD Foundation --- security/vuxml/vuln/2024.xml | 43 ++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 42 insertions(+), 1 deletion(-) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 0e3f9f90b4ef..7c9a74fc21df 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,43 @@ + + Intel CPUs -- multiple vulnerabilities + + + cpu-microcode-intel + 20241112 + + + + +

Intel reports:

+
+

+ A potential security vulnerability in some 4th and 5th Generation + Intel Xeon Processors may allow denial of service. Intel released + microcode updates to mitigate this potential vulnerability. +

+
+
+

+ Potential security vulnerabilities in some Intel Xeon processors using + Intel Software Guard Extensions (Intel SGX) may allow escalation of + privilege. Intel released firmware updates to mitigate these + potential vulnerabilities. +

+
+ +
+ + CVE-2024-21853 + CVE-2024-23918 + CVE-2024-21820 + https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20241112 + + + 2024-09-10 + 2024-09-10 + +
+ x11vnc -- access to shared memory segments @@ -2076,7 +2116,7 @@ cpu-microcode-intel - 20240910 + 20241112 @@ -2107,6 +2147,7 @@ 2024-09-10 2024-09-10 + 2024-11-12