Search for packages
| purl | pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1?distro=trixie |
| Next non-vulnerable version | 3.20260210.1 |
| Latest non-vulnerable version | 3.20260227.1 |
| Risk | 1.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-38q7-4ar3-sqcc
Aliases: CVE-2025-31648 |
microcode_ctl: From CVEorg collector |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-156n-abxx-d3fp | security update |
CVE-2019-14607
|
| VCID-1xju-dcmn-ube4 | intel-microcode: Improper input validation in some Intel(R) TDX module software |
CVE-2023-45745
|
| VCID-2ues-wvyq-6qc9 | Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2025-32086
|
| VCID-2ytx-vj3b-rfhb | hw: cpu: information disclosure in certain Intel processors |
CVE-2022-21151
|
| VCID-3dfb-1sgt-w3a8 | Mirrored regions with different values in 3rd Generation Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access. |
CVE-2024-25939
|
| VCID-3y3x-qqep-43ec | microcode_ctl: Improper initialization in UEFI firmware OutOfBandXML module |
CVE-2024-31157
|
| VCID-4429-qf2w-jqg3 | x86: MMIO Stale Data vulnerabilities |
CVE-2022-21166
XSA-404 |
| VCID-4bw3-w5hz-ekd1 | intel-microcode: Unexpected behavior in Intel(R) Core(TM) Ultra Processors |
CVE-2023-46103
|
| VCID-4uuw-pm94-1kak | Missing reference to active allocated resource for some Intel(R) Xeon(R) processors may allow an authenticated user to potentially enable denial of service via local access. |
CVE-2025-21090
|
| VCID-51f1-g2fa-1bbp | security update |
CVE-2019-11139
|
| VCID-51nr-8avm-qued | microcode_ctl: From CVEorg collector |
CVE-2025-20012
|
| VCID-5cgx-1n9u-gqbh | microcode_ctl: Exposure of sensitive information |
CVE-2024-45332
|
| VCID-5dq7-wfyt-2uhz | kernel: Possible Denial of Service on Intel(R) Processors |
CVE-2023-39368
|
| VCID-5vkn-4rqc-qkbk | microcode_ctl: From CVEorg collector |
CVE-2025-24495
|
| VCID-6ake-v15c-k7aq | Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2024-21820
|
| VCID-6jsn-7538-a7ha | L1 Terminal Fault speculative side channel |
CVE-2018-3646
XSA-273 |
| VCID-6mzy-wsz1-cyhf | kernel: Intel firmware update for incorrect calculation in microcode keying mechanism |
CVE-2022-33972
|
| VCID-6thk-vf9t-gygs | microcode_ctl: Insufficient granularity of access control in UEFI firmware |
CVE-2024-39279
|
| VCID-6vn3-vpg9-gfbk | intel-microcode: Improper input validation in some Intel® TDX module software |
CVE-2023-47855
|
| VCID-75cx-avm7-tfcb | Improper handling of overlap between protected memory ranges for some Intel(R) Xeon(R) 6 processor with Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2025-22889
|
| VCID-75hg-p8uc-p7ex | Speculative Store Bypass |
CVE-2018-3639
XSA-263 |
| VCID-7gm7-fjkv-z3e9 | security update |
CVE-2018-3640
|
| VCID-7vn6-5h93-27hn | L1 Terminal Fault speculative side channel |
CVE-2018-3620
|
| VCID-7wcy-5hnc-tfh4 | Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access. |
CVE-2025-20109
|
| VCID-8nyc-r2e4-17gr | Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2025-24305
|
| VCID-8vx6-ctvp-8qeq | kernel: Intel firmware update for insufficient granularity of access control in out-of-band management in some Intel Atom and Intel Xeon Scalable Processors |
CVE-2022-21216
|
| VCID-9en3-y22n-wydw | kernel: Local information disclosure on Intel(R) Xeon(R) D processors with Intel(R) SGX due to incorrect calculation in microcode |
CVE-2023-43490
|
| VCID-9yut-bdsw-gkfy | Microarchitectural Data Sampling speculative side channel |
CVE-2018-12127
|
| VCID-b3gf-ec3p-xyfx | Special Register Buffer speculative side channel |
CVE-2020-0543
XSA-320 |
| VCID-b55f-n1ed-g7eq | microcode_ctl: Uncaught exception in the core management mechanism |
CVE-2025-20054
|
| VCID-bzwc-9ueu-gka1 | Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2024-24853
|
| VCID-csy7-esn4-u3gq | x86: MMIO Stale Data vulnerabilities |
CVE-2022-21123
|
| VCID-dzdf-drjk-m3cj | kernel: Local information disclosure in some Intel(R) processors |
CVE-2023-38575
|
| VCID-efqu-9zy2-xyh5 | microcode: Fast store forward predictor - Cross Domain Training |
CVE-2021-0145
|
| VCID-eh71-uhnv-fqeb | Improper handling of physical or environmental conditions in some Intel(R) Processors may allow an authenticated user to enable denial of service via local access. |
CVE-2024-39355
|
| VCID-ejhc-6yqt-gkgv | x86: Indirect Target Selection |
CVE-2024-28956
XSA-469 |
| VCID-ejsj-eyej-huc6 | Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2024-23918
|
| VCID-et7e-7pq2-eubr | hw: cpu: information disclosure in Intel® Xeon® Scalable Processors |
CVE-2021-33117
|
| VCID-f859-13vd-7uef | Out-of-bounds write in the memory subsystem for some Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2025-26403
|
| VCID-f85r-c2em-vkhg | microcode: Out of bounds read for some Intel Atom processors |
CVE-2021-33120
|
| VCID-f91c-4ty9-h7a2 | hw: cpu: Intel: Stale Data Read from legacy xAPIC vulnerability |
CVE-2022-21233
|
| VCID-fe46-8fs3-p3fd | hw: Intel: Unauthorized error injection in Intel SGX or Intel TDX |
CVE-2022-41804
|
| VCID-g5ab-2m1x-yqat | hw: improper isolation of shared resources in some Intel Processors |
CVE-2020-24511
|
| VCID-gfba-7dea-myhj | security update |
CVE-2020-0549
|
| VCID-gmr7-umz8-9fhm | Insufficient granularity of access control in the OOB-MSM for some Intel(R) Xeon(R) 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access. |
CVE-2025-22839
|
| VCID-grm7-9n9w-ffc2 | Multiple vulnerabilities have been discovered in intel-microcode, the worst of which can lead to privilege escalation. |
CVE-2021-0127
|
| VCID-j4ak-hjn5-guat | microcode_ctl: Exposure of sensitive information |
CVE-2025-20623
|
| VCID-j6j9-vj4t-bfa6 | Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2025-20053
|
| VCID-jezv-tu74-b3ae | hw: Information disclosure issue in Intel SGX via RAPL interface |
CVE-2020-8695
|
| VCID-jqnr-61tn-kben | intel-microcode: Race conditions in some Intel(R) Processors |
CVE-2023-45733
|
| VCID-juy7-j265-cfax | hw: Vector Register Leakage-Active |
CVE-2020-8696
|
| VCID-jwaz-e1v9-uyep | hw: cpu: Incomplete cleanup in specific special register read operations (aka SRBDS update) |
CVE-2022-21127
|
| VCID-k45n-139y-pyeq | Microarchitectural Data Sampling speculative side channel |
CVE-2019-11091
|
| VCID-k9bk-q1ds-6ke5 | hw: vt-d related privilege escalation |
CVE-2020-24489
|
| VCID-kha2-8ez1-gfhr | Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access |
CVE-2025-22840
|
| VCID-mekt-8gm1-33ej | Observable discrepancy in RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access. |
CVE-2024-23984
|
| VCID-mu4u-d5mc-kbgk | Protection mechanism failure in some 3rd, 4th, and 5th Generation Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2024-24980
|
| VCID-npgb-p786-d3fe | microcode_ctl: Improper input validation in UEFI firmware |
CVE-2023-43758
|
| VCID-ns7u-fmmr-5ba4 | TSX Asynchronous Abort speculative side channel |
CVE-2019-11135
XSA-305 |
| VCID-p2fk-8snj-x7dy | x86: Register File Data Sampling |
CVE-2023-28746
XSA-452 |
| VCID-pgps-58ra-1ugy | kernel: Intel firmware update for Incorrect default permissions in some memory controller configurations |
CVE-2022-33196
|
| VCID-pxy4-1vew-vffs | hw: observable timing discrepancy in some Intel Processors |
CVE-2020-24512
|
| VCID-qtg5-1dxw-sfdc | microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm |
CVE-2024-29214
|
| VCID-qzcy-2xsr-vqeh | microcode_ctl: Improper input validation in UEFI firmware |
CVE-2024-28127
|
| VCID-r46f-12hj-7ybb | microcode_ctl: Denial of Service |
CVE-2024-24968
|
| VCID-t56a-46c7-fybe | hw: Intel: 3rd Generation processors may allow information disclosure |
CVE-2023-23908
|
| VCID-t7rc-zadf-cybq | microcode_ctl: Improper input validation in UEFI firmware |
CVE-2024-28047
|
| VCID-t85u-116v-7uan | microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware |
CVE-2024-24582
|
| VCID-td6e-x2qb-syg3 | x86: MMIO Stale Data vulnerabilities |
CVE-2022-21125
|
| VCID-trxm-8mg3-4bbr | x86/Intel: Gather Data Sampling |
CVE-2022-40982
XSA-435 |
| VCID-ufpa-pg91-w3ek | security update |
CVE-2020-0548
|
| VCID-uj7d-tpax-fqhd | kernel: local privilege escalation on Intel microcode on Intel(R) Xeon(R) |
CVE-2023-22655
|
| VCID-upx5-38qt-3kg9 | hw: Fast forward store predictor |
CVE-2020-8698
|
| VCID-v8fp-rzfq-e3bs | Information leak via side effects of speculative execution |
CVE-2017-5715
|
| VCID-vh89-pyaz-xbdg | Microarchitectural Data Sampling speculative side channel |
CVE-2018-12126
XSA-297 |
| VCID-vsda-kq13-73g1 | microcode_ctl: Improper input validation in UEFI firmware |
CVE-2023-34440
|
| VCID-w7k1-y36j-3ye6 | kernel: microcode_ctl: From CVEorg collector |
CVE-2024-21853
|
| VCID-wgce-vves-guek | kernel: microcode_ctl: From CVEorg collector |
CVE-2024-31068
|
| VCID-wqfe-hkrk-nbaj | microcode_ctl: Exposure of sensitive information |
CVE-2024-43420
|
| VCID-wv5f-6x7x-7fdw | kernel: microcode_ctl: From CVEorg collector |
CVE-2024-36293
|
| VCID-wyf3-shyh-qyhc | Sequence of processor instructions leads to unexpected behavior in the Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable denial of service via local access. |
CVE-2024-37020
|
| VCID-x4zx-7h35-nuf6 | hw: information disclosure on some Intel Atom processors |
CVE-2020-24513
|
| VCID-xb28-un42-1uag | Improper isolation in the Intel(R) Core(TM) Ultra Processor stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access. |
CVE-2023-42667
|
| VCID-yzkk-a8az-hff5 |
CVE-2018-3615
|
|
| VCID-z8gt-jznd-ryht | Improper isolation in some Intel(R) Processors stream cache mechanism may allow an authenticated user to potentially enable escalation of privilege via local access. |
CVE-2023-49141
|
| VCID-z9r8-s6v7-zkgd | Microarchitectural Data Sampling speculative side channel |
CVE-2018-12130
|
| VCID-zcxx-ra5c-hyh9 | microcode_ctl: Insufficient resource pool in the core management mechanism |
CVE-2025-20103
|
| VCID-ztyd-jwnm-m3gd | hw: Intel: execution of MOVSB instructions with redundant REX prefix leads to unintended system behavior |
CVE-2023-23583
|
| VCID-zx9g-4trv-hfgc | kernel: Intel firmware update for improper isolation of shared resources |
CVE-2022-38090
|