Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
634918a9 by Salvatore Bonaccorso at 2025-02-12T09:48:22+01:00
Add new intel-microcode CVEs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,63 @@
+CVE-2024-31068
+       - intel-microcode <unfixed>
+       [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-36293
+       - intel-microcode <unfixed>
+       [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-28047
+       - intel-microcode <unfixed>
+       [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-31157
+       - intel-microcode <unfixed>
+       [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-39279
+       - intel-microcode <unfixed>
+       [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-28127
+       - intel-microcode <unfixed>
+       [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-29214
+       - intel-microcode <unfixed>
+       [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-24582
+       - intel-microcode <unfixed>
+       [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2023-34440
+       - intel-microcode <unfixed>
+       [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2023-43758
+       - intel-microcode <unfixed>
+       [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-39355
+       - intel-microcode <unfixed>
+       [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-37020
+       - intel-microcode <unfixed>
+       [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
+       NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
+       NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2025-25203 (CtrlPanel is open-source billing software for hosting 
providers. Prior ...)
        NOT-FOR-US: CtrlPanel
 CVE-2025-23359 (NVIDIA Container Toolkit for Linux contains a Time-of-Check 
Time-of-Us ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/634918a936ac31b076d49aa0a2a839a81e430acd

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/634918a936ac31b076d49aa0a2a839a81e430acd
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to