Debian Package Tracker
Register | Log in
Subscribe

intel-microcode

Processor microcode firmware for Intel CPUs

Choose email to subscribe with

general
  • source: intel-microcode (non-free-firmware)
  • version: 3.20251111.1
  • maintainer: Henrique de Moraes Holschuh (DMD)
  • uploaders: Giacomo Catenazzi [DMD]
  • arch: amd64 i386 x32
  • std-ver: 4.1.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.20240813.1~deb11u1
  • o-o-sec: 3.20250812.1~deb11u1
  • o-o-p-u: 3.20240813.1~deb11u1
  • oldstable: 3.20251111.1~deb12u1
  • old-sec: 3.20250812.1~deb12u1
  • stable: 3.20251111.1~deb13u1
  • stable-sec: 3.20250812.1~deb13u1
  • testing: 3.20251111.1
  • unstable: 3.20251111.1
versioned links
  • 3.20240813.1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.20250812.1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.20250812.1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.20250812.1~deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.20251111.1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.20251111.1~deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.20251111.1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • intel-microcode (17 bugs: 0, 14, 3, 0)
action needed
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2025-31648: Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts.
Created: 2026-02-11 Last update: 2026-02-11 12:00
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2025-31648: Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts.
Created: 2026-02-11 Last update: 2026-02-11 12:00
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2025-31648: Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts.
Created: 2026-02-11 Last update: 2026-02-11 12:00
1 security issue in bullseye high

There is 1 open security issue in bullseye.

1 important issue:
  • CVE-2025-31648: Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts.
Created: 2026-02-11 Last update: 2026-02-11 12:00
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2025-31648: Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts.
Created: 2026-02-11 Last update: 2026-02-11 12:00
4 open merge requests in Salsa normal
There are 4 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-09-21 Last update: 2025-09-21 10:02
lintian reports 2 warnings normal
Lintian reports 2 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-09-14 Last update: 2025-09-14 13:33
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.1.1).
Created: 2018-01-05 Last update: 2025-12-23 20:00
news
[rss feed]
  • [2026-01-01] Accepted intel-microcode 3.20251111.1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-12-21] Accepted intel-microcode 3.20251111.1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-11-16] intel-microcode 3.20251111.1 MIGRATED to testing (Debian testing watch)
  • [2025-11-13] Accepted intel-microcode 3.20251111.1 (source) into unstable (Henrique de Moraes Holschuh)
  • [2025-11-01] Accepted intel-microcode 3.20250812.1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-10-26] Accepted intel-microcode 3.20250812.1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-10-25] Accepted intel-microcode 3.20250812.1~deb11u1 (source) into oldoldstable-security (Tobias Frost)
  • [2025-10-22] Accepted intel-microcode 3.20250812.1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-10-22] Accepted intel-microcode 3.20250812.1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-09-19] intel-microcode 3.20250812.1 MIGRATED to testing (Debian testing watch)
  • [2025-09-13] Accepted intel-microcode 3.20250812.1 (source) into unstable (Henrique de Moraes Holschuh)
  • [2025-05-25] Accepted intel-microcode 3.20250512.1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-05-23] Accepted intel-microcode 3.20250512.1~deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-05-22] intel-microcode 3.20250512.1 MIGRATED to testing (Debian testing watch)
  • [2025-05-18] Accepted intel-microcode 3.20250512.1~deb11u1 (source) into oldstable-security (Tobias Frost)
  • [2025-05-17] Accepted intel-microcode 3.20250512.1 (source) into unstable (Henrique de Moraes Holschuh)
  • [2025-03-29] Accepted intel-microcode 3.20250211.1~deb11u1 (source) into oldstable-security (Tobias Frost)
  • [2025-03-08] Accepted intel-microcode 3.20250211.1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2025-02-22] intel-microcode 3.20250211.1 MIGRATED to testing (Debian testing watch)
  • [2025-02-16] Accepted intel-microcode 3.20250211.1 (source) into unstable (Henrique de Moraes Holschuh)
  • [2024-12-23] Accepted intel-microcode 3.20241112.1~deb11u1 (source) into oldstable-security (Tobias Frost)
  • [2024-12-18] Accepted intel-microcode 3.20241112.1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2024-11-24] Accepted intel-microcode 3.20240910.1~deb11u1 (source) into oldstable-security (Tobias Frost)
  • [2024-11-20] intel-microcode 3.20241112.1 MIGRATED to testing (Debian testing watch)
  • [2024-11-14] Accepted intel-microcode 3.20241112.1 (source) into unstable (Henrique de Moraes Holschuh)
  • [2024-11-02] Accepted intel-microcode 3.20240910.1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2024-09-27] intel-microcode 3.20240910.1 MIGRATED to testing (Debian testing watch)
  • [2024-09-21] Accepted intel-microcode 3.20240910.1 (source) into unstable (Henrique de Moraes Holschuh)
  • [2024-08-22] Accepted intel-microcode 3.20240813.1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • [2024-08-21] Accepted intel-microcode 3.20240813.1~deb11u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Henrique de Moraes Holschuh)
  • 1
  • 2
bugs [bug history graph]
  • all: 18
  • RC: 0
  • I&N: 14
  • M&W: 4
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 2)
  • buildd: logs, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.20250812.1ubuntu1
  • 41 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing