Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 634918a9 by Salvatore Bonaccorso at 2025-02-12T09:48:22+01:00 Add new intel-microcode CVEs - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,63 @@ +CVE-2024-31068 + - intel-microcode <unfixed> + [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release) + NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html + NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211 +CVE-2024-36293 + - intel-microcode <unfixed> + [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release) + NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html + NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211 +CVE-2024-28047 + - intel-microcode <unfixed> + [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release) + NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html + NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211 +CVE-2024-31157 + - intel-microcode <unfixed> + [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release) + NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html + NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211 +CVE-2024-39279 + - intel-microcode <unfixed> + [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release) + NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html + NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211 +CVE-2024-28127 + - intel-microcode <unfixed> + [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release) + NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html + NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211 +CVE-2024-29214 + - intel-microcode <unfixed> + [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release) + NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html + NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211 +CVE-2024-24582 + - intel-microcode <unfixed> + [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release) + NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html + NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211 +CVE-2023-34440 + - intel-microcode <unfixed> + [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release) + NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html + NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211 +CVE-2023-43758 + - intel-microcode <unfixed> + [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release) + NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html + NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211 +CVE-2024-39355 + - intel-microcode <unfixed> + [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release) + NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html + NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211 +CVE-2024-37020 + - intel-microcode <unfixed> + [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release) + NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html + NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211 CVE-2025-25203 (CtrlPanel is open-source billing software for hosting providers. Prior ...) NOT-FOR-US: CtrlPanel CVE-2025-23359 (NVIDIA Container Toolkit for Linux contains a Time-of-Check Time-of-Us ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/634918a936ac31b076d49aa0a2a839a81e430acd -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/634918a936ac31b076d49aa0a2a839a81e430acd You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
