Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b255df42 by security tracker role at 2025-03-29T20:12:14+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,5 @@
+CVE-2024-55895 (IBM InfoSphere Information Server 11.7 could allow a remote 
attacker t ...)
+       TODO: check
 CVE-2025-31374
        REJECTED
 CVE-2025-31373
@@ -15764,61 +15766,73 @@ CVE-2024-57951 (In the Linux kernel, the following 
vulnerability has been resolv
 CVE-2025-26467
        - cassandra <itp> (bug #585905)
 CVE-2024-31068 (Improper Finite State Machines (FSMs) in Hardware Logic for 
some Intel ...)
+       {DLA-4095-1}
        - intel-microcode 3.20250211.1 (bug #1095805)
        [bookworm] - intel-microcode 3.20250211.1~deb12u1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-36293 (Improper access control in the EDECCSSA user leaf function for 
some In ...)
+       {DLA-4095-1}
        - intel-microcode 3.20250211.1 (bug #1095805)
        [bookworm] - intel-microcode 3.20250211.1~deb12u1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-28047 (Improper input validation in UEFI firmware for some Intel(R) 
Processor ...)
+       {DLA-4095-1}
        - intel-microcode 3.20250211.1 (bug #1095805)
        [bookworm] - intel-microcode 3.20250211.1~deb12u1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-31157 (Improper initialization in UEFI firmware OutOfBandXML module 
in some I ...)
+       {DLA-4095-1}
        - intel-microcode 3.20250211.1 (bug #1095805)
        [bookworm] - intel-microcode 3.20250211.1~deb12u1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-39279 (Insufficient granularity of access control in UEFI firmware in 
some In ...)
+       {DLA-4095-1}
        - intel-microcode 3.20250211.1 (bug #1095805)
        [bookworm] - intel-microcode 3.20250211.1~deb12u1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-28127 (Improper input validation in UEFI firmware for some Intel(R) 
Processor ...)
+       {DLA-4095-1}
        - intel-microcode 3.20250211.1 (bug #1095805)
        [bookworm] - intel-microcode 3.20250211.1~deb12u1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-29214 (Improper input validation in UEFI firmware 
CseVariableStorageSmm for s ...)
+       {DLA-4095-1}
        - intel-microcode 3.20250211.1 (bug #1095805)
        [bookworm] - intel-microcode 3.20250211.1~deb12u1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-24582 (Improper input validation in XmlCli feature for UEFI firmware 
for some ...)
+       {DLA-4095-1}
        - intel-microcode 3.20250211.1 (bug #1095805)
        [bookworm] - intel-microcode 3.20250211.1~deb12u1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2023-34440 (Improper input validation in UEFI firmware for some Intel(R) 
Processor ...)
+       {DLA-4095-1}
        - intel-microcode 3.20250211.1 (bug #1095805)
        [bookworm] - intel-microcode 3.20250211.1~deb12u1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2023-43758 (Improper input validation in UEFI firmware for some Intel(R) 
processor ...)
+       {DLA-4095-1}
        - intel-microcode 3.20250211.1 (bug #1095805)
        [bookworm] - intel-microcode 3.20250211.1~deb12u1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-39355 (Improper handling of physical or environmental conditions in 
some Inte ...)
+       {DLA-4095-1}
        - intel-microcode 3.20250211.1 (bug #1095805)
        [bookworm] - intel-microcode 3.20250211.1~deb12u1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
 CVE-2024-37020 (Sequence of processor instructions leads to unexpected 
behavior in the ...)
+       {DLA-4095-1}
        - intel-microcode 3.20250211.1 (bug #1095805)
        [bookworm] - intel-microcode 3.20250211.1~deb12u1
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b255df42a235f77628def843799a43a6ea9f73e3

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b255df42a235f77628def843799a43a6ea9f73e3
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to