1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-02-04 11:23:46 +00:00

security/vuxml: add FreeBSD kernel entries for recent Intel CVEs

PR:		241931
Submitted by:	Miroslav Lachman <000.fbsd@quip.cz>
Reviewed by:	dch
Approved by:	joneum (ports-secteam)
Security:	CVE-2019-11135
Security:	CVE-2019-11139
Security:	CVE-2018-12126
Security:	CVE-2018-12127
Security:	CVE-2018-12130
Security:	CVE-2018-11091
Security:	CVE-2017-5715
Security:	CVE-2018-12207
Sponsored by:	SkunkWerks, GmbH
This commit is contained in:
Dave Cottlehuber 2019-11-25 21:45:06 +00:00
parent 89bf42a732
commit 9544524acf
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=518430

View File

@ -58,6 +58,87 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="fbe10a8a-05a1-11ea-9dfa-f8b156ac3ff9">
<topic>FreeBSD -- Intel CPU Microcode Update</topic>
<affects>
<package>
<name>FreeBSD-kernel</name>
<range><ge>12.1</ge><lt>12.1_1</lt></range>
<range><ge>12.0</ge><lt>12.0_12</lt></range>
<range><ge>11.3</ge><lt>11.3_5</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Starting with version 1.26, the devcpu-data port/package includes
updates and mitigations for the following technical and security
advisories (depending on CPU model).</p>
<p>Intel TSX Updates (TAA) CVE-2019-11135 Voltage Modulation
Vulnerability CVE-2019-11139 MD_CLEAR Operations
CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2018-11091
TA Indirect Sharing CVE-2017-5715 EGETKEY CVE-2018-12126
CVE-2018-12127 CVE-2018-12130 CVE-2018-11091 JCC SKX102
Erratum </p>
<p>Updated microcode includes mitigations for
CPU issues, but may also cause a performance regression due
to the JCC erratum mitigation. Please visit
http://www.intel.com/benchmarks for further information.
</p>
<p>Please visit http://www.intel.com/security for
detailed information on these advisories as well as a list of
CPUs that are affected.</p>
<p>Operating a CPU without the latest microcode may result in erratic or
unpredictable behavior, including system crashes and lock ups.
Certain issues listed in this advisory may result in the leakage of
privileged system information to unprivileged users. Please refer to
the security advisories listed above for detailed information.</p>
</body>
</description>
<references>
<cvename>CVE-2019-11135</cvename>
<cvename>CVE-2019-11139</cvename>
<cvename>CVE-2018-12126</cvename>
<cvename>CVE-2018-12127</cvename>
<cvename>CVE-2018-12130</cvename>
<cvename>CVE-2018-11091</cvename>
<cvename>CVE-2017-5715</cvename>
<freebsdsa>SA-19:26.mcu</freebsdsa>
</references>
<dates>
<discovery>2019-11-14</discovery>
<entry>2019-11-25</entry>
</dates>
</vuln>
<vuln vid="edc0bf7e-05a1-11ea-9dfa-f8b156ac3ff9">
<topic>FreeBSD -- Machine Check Exception on Page Size Change</topic>
<affects>
<package>
<name>FreeBSD-kernel</name>
<range><ge>12.1</ge><lt>12.1_1</lt></range>
<range><ge>12.0</ge><lt>12.0_12</lt></range>
<range><ge>11.3</ge><lt>11.3_5</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Intel discovered a previously published erratum on some Intel
platforms can be exploited by malicious software to potentially cause
a denial of service by triggering a machine check that will crash or
hang the system.</p>
<p>Malicious guest operating systems may be able to crash the host.</p>
</body>
</description>
<references>
<cvename>CVE-2018-12207</cvename>
<freebsdsa>SA-19:25.mcepsc</freebsdsa>
</references>
<dates>
<discovery>2019-11-14</discovery>
<entry>2019-11-25</entry>
</dates>
</vuln>
<vuln vid="6ade62d9-0f62-11ea-9673-4c72b94353b5">
<topic>clamav -- Denial-of-Service (DoS) vulnerability</topic>
<affects>