Date: Mon, 15 Apr 2024 09:09:57 +0000 From: =?iso-8859-2?Q?Marek_Anio=B3a?= <man130117@outlook.com> To: "freebsd-security@freebsd.org" <freebsd-security@freebsd.org> Subject: cpu-microcode-intel-20231114 Message-ID: <AM5PR03MB296289896D3D652DA041DDC7A8092@AM5PR03MB2962.eurprd03.prod.outlook.com>
next in thread | raw e-mail | index | archive | help
As of 13 March 2024. "pkg audit" reports the following vulnerabilities in F= reeBSD 13.3-RELEASE-p1:=0A= =0A= cpu-microcode-intel-20231114 is vulnerable:=0A= =A0 Intel processors - multiple vulnerabilities=0A= =A0 CVE: CVE-2023-43490=0A= =A0 CVE: CVE-2023-22655=0A= =A0 CVE: CVE-2023-28746=0A= =A0 CVE: CVE-2023-38575=0A= =A0 CVE: CVE-2023-39368=0A= =A0 WWW: https://vuxml.FreeBSD.org/freebsd/b6dd9d93-e09b-11ee-92fc-1c697a61= 6631.html=0A= =0A= Found 1 issue(s) in 1 installed package(s).=0A= =0A= The website https://www.freshports.org/sysutils/cpu-microcode-intel/ shows = that an update to the package appeared the day before (2024-03-12), but the= BINARY package providing THE UPDATE IS STILL NOT AVAILABLE!=0A= =0A= Should this be the case?=0A= Or, should I update the microcode in some other way?=0A= =0A= Marek Anio=B3a=0A=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?AM5PR03MB296289896D3D652DA041DDC7A8092>