svn commit: r523111 - head/security/vuxml
Niclas Zeising
zeising at FreeBSD.org
Wed Jan 15 13:54:44 UTC 2020
Author: zeising
Date: Wed Jan 15 13:54:43 2020
New Revision: 523111
URL: https://svnweb.freebsd.org/changeset/ports/523111
Log:
vuxml: Document recent intel GPU vulnerability
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Wed Jan 15 13:54:10 2020 (r523110)
+++ head/security/vuxml/vuln.xml Wed Jan 15 13:54:43 2020 (r523111)
@@ -58,6 +58,55 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="d2c2c815-3793-11ea-8be3-54e1ad3d6335">
+ <topic>drm graphics drivers -- potential information disclusure via local access</topic>
+ <affects>
+ <package>
+ <name>drm-fbsd11.2-kmod</name>
+ <range><lt>4.11.g20200115</lt></range>
+ </package>
+ <package>
+ <name>drm-fbsd12.0-kmod</name>
+ <range><lt>4.16.g20200115</lt></range>
+ </package>
+ <package>
+ <name>drm-current-kmod</name>
+ <range><lt>4.16.g20200115</lt></range>
+ </package>
+ <package>
+ <name>drm-devel-kmod</name>
+ <range><lt>5.0.g20200115</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Intel reports:</p>
+ <blockquote cite="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html">
+ <p>.A potential security vulnerability in Intel(R) Processor Graphics
+ may allow information disclosure. Intel is releasing software
+ updates to mitigate this potential vulnerability.</p>
+ <p>Description: Insufficient control flow in certain data
+ structures for some Intel(R) Processors with Intel(R) Processor
+ Graphics may allow an unauthenticated user to potentially enable
+ information disclosure via local access.</p>
+ <p>This patch provides mitigation for Gen9 hardware only. Patches
+ for Gen7 and Gen7.5 will be provided later. Note that Gen8 is not
+ impacted due to a previously implemented workaround. The mitigation
+ involves using an existing hardware feature to forcibly clear down
+ all EU state at each context switch.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html</url>
+ <cvename>CVE-2019-14615</cvename>
+ </references>
+ <dates>
+ <discovery>2020-01-14</discovery>
+ <entry>2020-01-15</entry>
+ </dates>
+ </vuln>
+
<vuln vid="2bab995f-36d4-11ea-9dad-002590acae31">
<topic>Template::Toolkit -- Directory traversal on write</topic>
<affects>
More information about the svn-ports-head
mailing list