Search for packages
| purl | pkg:deb/debian/intel-microcode@3.20251111.1~deb12u1 |
| Next non-vulnerable version | 3.20260227.1 |
| Latest non-vulnerable version | 3.20260227.1 |
| Risk | 1.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-38q7-4ar3-sqcc
Aliases: CVE-2025-31648 |
microcode_ctl: From CVEorg collector |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2ues-wvyq-6qc9 | Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2025-32086
|
| VCID-3y3x-qqep-43ec | microcode_ctl: Improper initialization in UEFI firmware OutOfBandXML module |
CVE-2024-31157
|
| VCID-4uuw-pm94-1kak | Missing reference to active allocated resource for some Intel(R) Xeon(R) processors may allow an authenticated user to potentially enable denial of service via local access. |
CVE-2025-21090
|
| VCID-51nr-8avm-qued | microcode_ctl: From CVEorg collector |
CVE-2025-20012
|
| VCID-5cgx-1n9u-gqbh | microcode_ctl: Exposure of sensitive information |
CVE-2024-45332
|
| VCID-5vkn-4rqc-qkbk | microcode_ctl: From CVEorg collector |
CVE-2025-24495
|
| VCID-6ake-v15c-k7aq | Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2024-21820
|
| VCID-6thk-vf9t-gygs | microcode_ctl: Insufficient granularity of access control in UEFI firmware |
CVE-2024-39279
|
| VCID-75cx-avm7-tfcb | Improper handling of overlap between protected memory ranges for some Intel(R) Xeon(R) 6 processor with Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2025-22889
|
| VCID-7wcy-5hnc-tfh4 | Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access. |
CVE-2025-20109
|
| VCID-8nyc-r2e4-17gr | Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2025-24305
|
| VCID-b55f-n1ed-g7eq | microcode_ctl: Uncaught exception in the core management mechanism |
CVE-2025-20054
|
| VCID-eh71-uhnv-fqeb | Improper handling of physical or environmental conditions in some Intel(R) Processors may allow an authenticated user to enable denial of service via local access. |
CVE-2024-39355
|
| VCID-ejhc-6yqt-gkgv | x86: Indirect Target Selection |
CVE-2024-28956
XSA-469 |
| VCID-ejsj-eyej-huc6 | Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2024-23918
|
| VCID-f859-13vd-7uef | Out-of-bounds write in the memory subsystem for some Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2025-26403
|
| VCID-gmr7-umz8-9fhm | Insufficient granularity of access control in the OOB-MSM for some Intel(R) Xeon(R) 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access. |
CVE-2025-22839
|
| VCID-j4ak-hjn5-guat | microcode_ctl: Exposure of sensitive information |
CVE-2025-20623
|
| VCID-j6j9-vj4t-bfa6 | Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access. |
CVE-2025-20053
|
| VCID-kha2-8ez1-gfhr | Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access |
CVE-2025-22840
|
| VCID-mekt-8gm1-33ej | Observable discrepancy in RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access. |
CVE-2024-23984
|
| VCID-npgb-p786-d3fe | microcode_ctl: Improper input validation in UEFI firmware |
CVE-2023-43758
|
| VCID-qtg5-1dxw-sfdc | microcode_ctl: Improper input validation in UEFI firmware CseVariableStorageSmm |
CVE-2024-29214
|
| VCID-qzcy-2xsr-vqeh | microcode_ctl: Improper input validation in UEFI firmware |
CVE-2024-28127
|
| VCID-r46f-12hj-7ybb | microcode_ctl: Denial of Service |
CVE-2024-24968
|
| VCID-t7rc-zadf-cybq | microcode_ctl: Improper input validation in UEFI firmware |
CVE-2024-28047
|
| VCID-t85u-116v-7uan | microcode_ctl: Improper input validation in XmlCli feature for UEFI firmware |
CVE-2024-24582
|
| VCID-vsda-kq13-73g1 | microcode_ctl: Improper input validation in UEFI firmware |
CVE-2023-34440
|
| VCID-w7k1-y36j-3ye6 | kernel: microcode_ctl: From CVEorg collector |
CVE-2024-21853
|
| VCID-wgce-vves-guek | kernel: microcode_ctl: From CVEorg collector |
CVE-2024-31068
|
| VCID-wqfe-hkrk-nbaj | microcode_ctl: Exposure of sensitive information |
CVE-2024-43420
|
| VCID-wv5f-6x7x-7fdw | kernel: microcode_ctl: From CVEorg collector |
CVE-2024-36293
|
| VCID-wyf3-shyh-qyhc | Sequence of processor instructions leads to unexpected behavior in the Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable denial of service via local access. |
CVE-2024-37020
|
| VCID-zcxx-ra5c-hyh9 | microcode_ctl: Insufficient resource pool in the core management mechanism |
CVE-2025-20103
|