[FREEBSD:B6DD9D93-E09B-11EE-92FC-1C697A616631] Intel CPUs -- multiple vulnerabilities
Severity
Medium
Affected Packages
1
CVEs
5
Intel reports:
2024.1 IPU - Intel Processor Bus Lock Advisory
A potential security vulnerability in the bus lock regulator
mechanism for some Intel Processors may allow denial of service. Intel
is releasing firmware updates to mitigate this potential
vulnerability.
2024.1 IPU - Intel Processor Return Predictions Advisory
A potential security vulnerability in some Intel Processors may
allow information disclosure.
2024.1 IPU - Intel Atom Processor Advisory
A potential security vulnerability in some Intel Atom Processors
may allow information disclosure.
2024.1 IPU - Intel Xeon Processor Advisory
A potential security vulnerability in some 3rd and 4th Generation
Intel Xeon Processors when using Intel Software Guard Extensions (SGX)
or Intel Trust Domain Extensions (TDX) may allow escalation of
privilege.
2024.1 IPU OOB - Intel Xeon D Processor Advisory
A potential security vulnerability in some Intel Xeon D Processors
with Intel Software Guard Extensions (SGX) may allow information
disclosure.
Package | Affected Version |
---|---|
pkg:freebsd/cpu-microcode-intel | < 20240312 |
- ID
- FREEBSD:B6DD9D93-E09B-11EE-92FC-1C697A616631
- Severity
- medium
- Severity from
- CVE-2023-39368
- URL
- http://vuxml.freebsd.org/freebsd/b6dd9d93-e09b-11ee-92fc-1c697a616631.html
- Published
-
2023-03-12T00:00:00
(18 months ago) - Modified
-
2024-03-12T00:00:00
(6 months ago) - Rights
- FreeBSD VuXML Security Team
- Other Advisories
-
- ALAS2-2024-2491
- ALPINE:CVE-2023-22655
- ALPINE:CVE-2023-28746
- ALPINE:CVE-2023-38575
- ALPINE:CVE-2023-39368
- ALPINE:CVE-2023-43490
- ALSA-2024:5101
- DSA-5681-1
- ELSA-2024-5101
- FEDORA-2024-29f57f1b4e
- FEDORA-2024-3a36322c4b
- FEDORA-2024-96f3c3f3d3
- FEDORA-2024-9e9f53d01d
- FEDORA-2024-f3692f8528
- MS:CVE-2023-28746
- RHSA-2024:5101
- RLSA-2024:5101
- SUSE-SU-2024:0856-1
- SUSE-SU-2024:0857-1
- SUSE-SU-2024:0858-1
- SUSE-SU-2024:0900-1
- SUSE-SU-2024:0900-2
- SUSE-SU-2024:0910-1
- SUSE-SU-2024:0917-1
- SUSE-SU-2024:0925-1
- SUSE-SU-2024:0926-1
- SUSE-SU-2024:0975-1
- SUSE-SU-2024:0976-1
- SUSE-SU-2024:0977-1
- SUSE-SU-2024:1101-1
- SUSE-SU-2024:1102-1
- SUSE-SU-2024:1105-1
- SUSE-SU-2024:1139-1
- SUSE-SU-2024:1152-1
- SUSE-SU-2024:1321-1
- SUSE-SU-2024:1322-1
- SUSE-SU-2024:1454-1
- SUSE-SU-2024:1466-1
- SUSE-SU-2024:1480-1
- SUSE-SU-2024:1489-1
- SUSE-SU-2024:1490-1
- SUSE-SU-2024:1643-1
- SUSE-SU-2024:1648-1
- SUSE-SU-2024:1669-1
- SUSE-SU-2024:1870-1
- SUSE-SU-2024:2535-1
- USN-6797-1
- XSA-452
Source | # ID | Name | URL |
---|---|---|---|
FreeBSD VuXML | https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20240312 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:freebsd/cpu-microcode-intel | cpu-microcode-intel | < 20240312 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |