Skip site navigation (1)Skip section navigation (2)


| raw e-mail | index | archive | help
As of 13 March 2024. "pkg audit" reports the following vulnerabilities in F=
reeBSD 13.3-RELEASE-p1:=0A=
=0A=
cpu-microcode-intel-20231114 is vulnerable:=0A=
=A0 Intel processors - multiple vulnerabilities=0A=
=A0 CVE: CVE-2023-43490=0A=
=A0 CVE: CVE-2023-22655=0A=
=A0 CVE: CVE-2023-28746=0A=
=A0 CVE: CVE-2023-38575=0A=
=A0 CVE: CVE-2023-39368=0A=
=A0 WWW: https://vuxml.FreeBSD.org/freebsd/b6dd9d93-e09b-11ee-92fc-1c697a61=
6631.html=0A=
=0A=
Found 1 issue(s) in 1 installed package(s).=0A=
=0A=
The website https://www.freshports.org/sysutils/cpu-microcode-intel/ shows =
that an update to the package appeared the day before (2024-03-12), but the=
 BINARY package providing THE UPDATE IS STILL NOT AVAILABLE!=0A=
=0A=
Should this be the case?=0A=
Or, should I update the microcode in some other way?=0A=
=0A=
Marek Anio=B3a=0A=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?>