Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 15 Apr 2024 09:09:57 +0000
From:      =?iso-8859-2?Q?Marek_Anio=B3a?= <man130117@outlook.com>
To:        "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>
Subject:   cpu-microcode-intel-20231114
Message-ID:  <AM5PR03MB296289896D3D652DA041DDC7A8092@AM5PR03MB2962.eurprd03.prod.outlook.com>

next in thread | raw e-mail | index | archive | help
As of 13 March 2024. "pkg audit" reports the following vulnerabilities in F=
reeBSD 13.3-RELEASE-p1:=0A=
=0A=
cpu-microcode-intel-20231114 is vulnerable:=0A=
=A0 Intel processors - multiple vulnerabilities=0A=
=A0 CVE: CVE-2023-43490=0A=
=A0 CVE: CVE-2023-22655=0A=
=A0 CVE: CVE-2023-28746=0A=
=A0 CVE: CVE-2023-38575=0A=
=A0 CVE: CVE-2023-39368=0A=
=A0 WWW: https://vuxml.FreeBSD.org/freebsd/b6dd9d93-e09b-11ee-92fc-1c697a61=
6631.html=0A=
=0A=
Found 1 issue(s) in 1 installed package(s).=0A=
=0A=
The website https://www.freshports.org/sysutils/cpu-microcode-intel/ shows =
that an update to the package appeared the day before (2024-03-12), but the=
 BINARY package providing THE UPDATE IS STILL NOT AVAILABLE!=0A=
=0A=
Should this be the case?=0A=
Or, should I update the microcode in some other way?=0A=
=0A=
Marek Anio=B3a=0A=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?AM5PR03MB296289896D3D652DA041DDC7A8092>