[Git][security-tracker-team/security-tracker][master] Track fixed version for intel-microcode updates via unstable

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Feb 17 07:02:40 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
66f6ec84 by Salvatore Bonaccorso at 2025-02-17T08:02:10+01:00
Track fixed version for intel-microcode updates via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1108,62 +1108,62 @@ CVE-2024-57951 (In the Linux kernel, the following vulnerability has been resolv
 CVE-2025-26467
 	- cassandra <itp> (bug #585905)
 CVE-2024-31068 (Improper Finite State Machines (FSMs) in Hardware Logic for some Intel ...)
-	- intel-microcode <unfixed> (bug #1095805)
+	- intel-microcode 3.20250211.1 (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-36293 (Improper access control in the EDECCSSA user leaf function for some In ...)
-	- intel-microcode <unfixed> (bug #1095805)
+	- intel-microcode 3.20250211.1 (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-28047 (Improper input validation in UEFI firmware for some Intel(R) Processor ...)
-	- intel-microcode <unfixed> (bug #1095805)
+	- intel-microcode 3.20250211.1 (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-31157 (Improper initialization in UEFI firmware OutOfBandXML module in some I ...)
-	- intel-microcode <unfixed> (bug #1095805)
+	- intel-microcode 3.20250211.1 (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-39279 (Insufficient granularity of access control in UEFI firmware in some In ...)
-	- intel-microcode <unfixed> (bug #1095805)
+	- intel-microcode 3.20250211.1 (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-28127 (Improper input validation in UEFI firmware for some Intel(R) Processor ...)
-	- intel-microcode <unfixed> (bug #1095805)
+	- intel-microcode 3.20250211.1 (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-29214 (Improper input validation in UEFI firmware CseVariableStorageSmm for s ...)
-	- intel-microcode <unfixed> (bug #1095805)
+	- intel-microcode 3.20250211.1 (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-24582 (Improper input validation in XmlCli feature for UEFI firmware for some ...)
-	- intel-microcode <unfixed> (bug #1095805)
+	- intel-microcode 3.20250211.1 (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2023-34440 (Improper input validation in UEFI firmware for some Intel(R) Processor ...)
-	- intel-microcode <unfixed> (bug #1095805)
+	- intel-microcode 3.20250211.1 (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2023-43758 (Improper input validation in UEFI firmware for some Intel(R) processor ...)
-	- intel-microcode <unfixed> (bug #1095805)
+	- intel-microcode 3.20250211.1 (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-39355 (Improper handling of physical or environmental conditions in some Inte ...)
-	- intel-microcode <unfixed> (bug #1095805)
+	- intel-microcode 3.20250211.1 (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-37020 (Sequence of processor instructions leads to unexpected behavior in the ...)
-	- intel-microcode <unfixed> (bug #1095805)
+	- intel-microcode 3.20250211.1 (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/66f6ec845dcabd1fa0f2f3a4c8ebf8268670f494

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/66f6ec845dcabd1fa0f2f3a4c8ebf8268670f494
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250217/48523e84/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list