Date: Wed, 15 Jan 2020 13:54:43 +0000 (UTC) From: Niclas Zeising <zeising@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r523111 - head/security/vuxml Message-ID: <202001151354.00FDshji092615@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: zeising Date: Wed Jan 15 13:54:43 2020 New Revision: 523111 URL: https://svnweb.freebsd.org/changeset/ports/523111 Log: vuxml: Document recent intel GPU vulnerability Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Jan 15 13:54:10 2020 (r523110) +++ head/security/vuxml/vuln.xml Wed Jan 15 13:54:43 2020 (r523111) @@ -58,6 +58,55 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="d2c2c815-3793-11ea-8be3-54e1ad3d6335"> + <topic>drm graphics drivers -- potential information disclusure via local access</topic> + <affects> + <package> + <name>drm-fbsd11.2-kmod</name> + <range><lt>4.11.g20200115</lt></range> + </package> + <package> + <name>drm-fbsd12.0-kmod</name> + <range><lt>4.16.g20200115</lt></range> + </package> + <package> + <name>drm-current-kmod</name> + <range><lt>4.16.g20200115</lt></range> + </package> + <package> + <name>drm-devel-kmod</name> + <range><lt>5.0.g20200115</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Intel reports:</p> + <blockquote cite="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html"> + <p>.A potential security vulnerability in Intel(R) Processor Graphics + may allow information disclosure. Intel is releasing software + updates to mitigate this potential vulnerability.</p> + <p>Description: Insufficient control flow in certain data + structures for some Intel(R) Processors with Intel(R) Processor + Graphics may allow an unauthenticated user to potentially enable + information disclosure via local access.</p> + <p>This patch provides mitigation for Gen9 hardware only. Patches + for Gen7 and Gen7.5 will be provided later. Note that Gen8 is not + impacted due to a previously implemented workaround. The mitigation + involves using an existing hardware feature to forcibly clear down + all EU state at each context switch.</p> + </blockquote> + </body> + </description> + <references> + <url>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html</url> + <cvename>CVE-2019-14615</cvename> + </references> + <dates> + <discovery>2020-01-14</discovery> + <entry>2020-01-15</entry> + </dates> + </vuln> + <vuln vid="2bab995f-36d4-11ea-9dad-002590acae31"> <topic>Template::Toolkit -- Directory traversal on write</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202001151354.00FDshji092615>