[Git][security-tracker-team/security-tracker][master] Add new intel-microcode CVEs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Feb 12 08:48:50 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
634918a9 by Salvatore Bonaccorso at 2025-02-12T09:48:22+01:00
Add new intel-microcode CVEs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,63 @@
+CVE-2024-31068
+	- intel-microcode <unfixed>
+	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
+	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-36293
+	- intel-microcode <unfixed>
+	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
+	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-28047
+	- intel-microcode <unfixed>
+	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-31157
+	- intel-microcode <unfixed>
+	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-39279
+	- intel-microcode <unfixed>
+	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-28127
+	- intel-microcode <unfixed>
+	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-29214
+	- intel-microcode <unfixed>
+	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-24582
+	- intel-microcode <unfixed>
+	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2023-34440
+	- intel-microcode <unfixed>
+	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2023-43758
+	- intel-microcode <unfixed>
+	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
+	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-39355
+	- intel-microcode <unfixed>
+	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
+	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
+CVE-2024-37020
+	- intel-microcode <unfixed>
+	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
+	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
+	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2025-25203 (CtrlPanel is open-source billing software for hosting providers. Prior ...)
 	NOT-FOR-US: CtrlPanel
 CVE-2025-23359 (NVIDIA Container Toolkit for Linux contains a Time-of-Check Time-of-Us ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/634918a936ac31b076d49aa0a2a839a81e430acd

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/634918a936ac31b076d49aa0a2a839a81e430acd
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250212/6dd6a8f4/attachment.htm>


More information about the debian-security-tracker-commits mailing list