[Git][security-tracker-team/security-tracker][master] Add new intel-microcode CVEs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Feb 12 08:48:50 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
634918a9 by Salvatore Bonaccorso at 2025-02-12T09:48:22+01:00
Add new intel-microcode CVEs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,63 @@
+CVE-2024-31068
+ - intel-microcode <unfixed>
+ [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
+ NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-36293
+ - intel-microcode <unfixed>
+ [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
+ NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-28047
+ - intel-microcode <unfixed>
+ [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+ NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-31157
+ - intel-microcode <unfixed>
+ [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+ NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-39279
+ - intel-microcode <unfixed>
+ [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+ NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-28127
+ - intel-microcode <unfixed>
+ [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+ NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-29214
+ - intel-microcode <unfixed>
+ [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+ NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-24582
+ - intel-microcode <unfixed>
+ [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+ NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2023-34440
+ - intel-microcode <unfixed>
+ [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+ NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2023-43758
+ - intel-microcode <unfixed>
+ [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+ NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-39355
+ - intel-microcode <unfixed>
+ [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
+ NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-37020
+ - intel-microcode <unfixed>
+ [bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+ NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
+ NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
CVE-2025-25203 (CtrlPanel is open-source billing software for hosting providers. Prior ...)
NOT-FOR-US: CtrlPanel
CVE-2025-23359 (NVIDIA Container Toolkit for Linux contains a Time-of-Check Time-of-Us ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/634918a936ac31b076d49aa0a2a839a81e430acd
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/634918a936ac31b076d49aa0a2a839a81e430acd
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250212/6dd6a8f4/attachment.htm>
More information about the debian-security-tracker-commits
mailing list