|
|
Subscribe / Log in / New account

Mageia alert MGASA-2025-0236 (microcode)

From:  Mageia Updates <updates-announce@ml.mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2025-0236: Updated microcode packages fix security vulnerabilities
Date:  Fri, 10 Oct 2025 05:12:59 +0200
Message-ID:  <20251010031259.243CE9F951@duvel.mageia.org>
Archive-link:  Article

MGASA-2025-0236 - Updated microcode packages fix security vulnerabilities Publication date: 10 Oct 2025 URL: https://advisories.mageia.org/MGASA-2025-0236.html Type: security Affected Mageia releases: 9 CVE: CVE-2025-20109, CVE-2025-22840, CVE-2025-22839, CVE-2025-20053, CVE-2025-24305, CVE-2025-21090, CVE-2025-26403, CVE-2025-32086 Description: The updated package updates AMD cpu microcode for processor family 19h, adds AMD cpu microcode for processor family 1ah and fixes security vulnerabilities for Intel processors: Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel\xae Processors may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2025-20109) Sequence of processor instructions leads to unexpected behavior for some Intel\xae Xeon\xae 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access. (CVE-2025-22840) Insufficient granularity of access control in the OOB-MSM for some Intel\xae Xeon\xae 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access. (CVE-2025-22839) Improper handling of overlap between protected memory ranges for some Intel\xae Xeon\xae 6 processor with Intel\xae TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-22889) Improper buffer restrictions for some Intel\xae Xeon\xae Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-20053) Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel\xae Xeon\xae processors may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-24305) Missing reference to active allocated resource for some Intel\xae Xeon\xae processors may allow an authenticated user to potentially enable denial of service via local access. (CVE-2025-21090) Out-of-bounds write in the memory subsystem for some Intel\xae Xeon\xae 6 processors when using Intel\xae SGX or Intel\xae TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-26403) Improperly implemented security check for standard in the DDRIO configuration for some Intel\xae Xeon\xae 6 Processors when using Intel\xae SGX or Intel\xae TDX may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2025-32086) References: - https://bugs.mageia.org/show_bug.cgi?id=34629 - https://github.com/intel/Intel-Linux-Processor-Microcode-... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3... SRPMS: - 9/nonfree/microcode-0.20250812-1.mga9.nonfree


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds