View | Details | Raw Unified | Return to bug 241931 | Differences between
and this patch

Collapse All | Expand All

(-)vuln.xml (-1 / +84 lines)
Lines 58-65 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="fbe10a8a-05a1-11ea-9dfa-f8b156ac3ff9">
62
    <topic>FreeBSD -- Intel CPU Microcode Update</topic>
63
    <affects>
64
      <package>
65
	<name>FreeBSD-kernel</name>
66
	<range><ge>12.1</ge><lt>12.1_1</lt></range>
67
	<range><ge>12.0</ge><lt>12.0_12</lt></range>
68
	<range><ge>11.3</ge><lt>11.3_5</lt></range>
69
      </package>
70
    </affects>
71
    <description>
72
      <body xmlns="http://www.w3.org/1999/xhtml">
73
	<h1>Problem Description:</h1>
74
	<p>Starting with version 1.26, the devcpu-data port/package includes
75
	updates and mitigations for the following technical and security
76
	advisories (depending on CPU model).</p>
77
	<p>Intel TSX Updates (TAA) CVE-2019-11135 Voltage Modulation
78
	Vulnerability CVE-2019-11139 MD_CLEAR Operations
79
	CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2018-11091
80
	TA Indirect Sharing CVE-2017-5715 EGETKEY CVE-2018-12126
81
	CVE-2018-12127 CVE-2018-12130 CVE-2018-11091 JCC SKX102
82
	Erratum </p> <p>Updated microcode includes mitigations for
83
	CPU issues, but may also cause a performance regression due
84
	to the JCC erratum mitigation.  Please visit
85
	http://www.intel.com/benchmarks for further information.
86
	</p> <p>Please visit http://www.intel.com/security for
87
	detailed information on these advisories as well as a list of
88
	CPUs that are affected.</p>
89
	<h1>Impact:</h1>
90
	<p>Operating a CPU without the latest microcode may result in erratic or
91
	unpredictable behavior, including system crashes and lock ups.
92
	Certain issues listed in this advisory may result in the leakage of
93
	privileged system information to unprivileged users.  Please refer to
94
	the security advisories listed above for detailed information.</p>
95
      </body>
96
    </description>
97
    <references>
98
      <cvename>CVE-2019-11135</cvename>
99
      <cvename>CVE-2019-11139</cvename>
100
      <cvename>CVE-2018-12126</cvename>
101
      <cvename>CVE-2018-12127</cvename>
102
      <cvename>CVE-2018-12130</cvename>
103
      <cvename>CVE-2018-11091</cvename>
104
      <cvename>CVE-2017-5715</cvename>
105
      <freebsdsa>SA-19:26.mcu</freebsdsa>
106
    </references>
107
    <dates>
108
      <discovery>2019-11-12</discovery>
109
      <entry>2019-11-13</entry>
110
    </dates>
111
  </vuln>
112
113
  <vuln vid="edc0bf7e-05a1-11ea-9dfa-f8b156ac3ff9">
114
    <topic>FreeBSD -- Machine Check Exception on Page Size Change</topic>
115
    <affects>
116
      <package>
117
	<name>FreeBSD-kernel</name>
118
	<range><ge>12.1</ge><lt>12.1_1</lt></range>
119
	<range><ge>12.0</ge><lt>12.0_12</lt></range>
120
	<range><ge>11.3</ge><lt>11.3_5</lt></range>
121
      </package>
122
    </affects>
123
    <description>
124
      <body xmlns="http://www.w3.org/1999/xhtml">
125
	<h1>Problem Description:</h1>
126
	<p>Intel discovered a previously published erratum on some Intel
127
	platforms can be exploited by malicious software to potentially cause
128
	a denial of service by triggering a machine check that will crash or
129
	hang the system.</p>
130
	<h1>Impact:</h1>
131
	<p>Malicious guest operating systems may be able to crash the host.</p>
132
      </body>
133
    </description>
134
    <references>
135
      <cvename>CVE-2018-12207</cvename>
136
      <freebsdsa>SA-19:25.mcepsc</freebsdsa>
137
    </references>
138
    <dates>
139
      <discovery>2019-11-12</discovery>
140
      <entry>2019-11-13</entry>
141
    </dates>
142
  </vuln>
143
61
  <vuln vid="ecb7fdec-0b82-11ea-874d-0c9d925bbbc0">
144
  <vuln vid="ecb7fdec-0b82-11ea-874d-0c9d925bbbc0">
62
    <topic>drm graphics drivers  -- Local privilege escalation and denial of serivce</topic>
145
    <topic>drm graphics drivers -- Local privilege escalation and denial of service</topic>
63
    <affects>
146
    <affects>
64
      <package>
147
      <package>
65
	<name>drm-current-kmod</name>
148
	<name>drm-current-kmod</name>

Return to bug 241931