Debian alert DSA-6030-1 (intel-microcode)
| From: | Salvatore Bonaccorso <carnil@debian.org> | |
| To: | debian-security-announce@lists.debian.org | |
| Subject: | [SECURITY] [DSA 6030-1] intel-microcode security update | |
| Date: | Wed, 22 Oct 2025 16:39:26 +0000 | |
| Message-ID: | <E1vBbry-00E0TW-2r@seger.debian.org> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6030-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso October 22, 2025 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : intel-microcode CVE ID : CVE-2025-20053 CVE-2025-20109 CVE-2025-21090 CVE-2025-22839 CVE-2025-22840 CVE-2025-22889 CVE-2025-24305 CVE-2025-26403 CVE-2025-32086 Debian Bug : 1110983 This update ships updated CPU microcode for some types of Intel CPUs and provides mitigations for security vulnerabilities which could result in privilege escalation or denial of service. For the oldstable distribution (bookworm), these problems have been fixed in version 3.20250812.1~deb12u1. For the stable distribution (trixie), these problems have been fixed in version 3.20250812.1~deb13u1. We recommend that you upgrade your intel-microcode packages. For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmj5CGpfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0S4wg//f5b8tgj1WduHx+r9PnAcG1fOup6xbd9J70Y7mFjR+0IMJJzCI1E0tMcI mdKYJYx8hCP4al2ORuqWCWO9DDHx/cnOmyrOWGNGKM//hWlv2PdiRY6/mqv+UNLv wTXQrt9LIQbjVanh0fTO381BVkO9std4Yb/C/7+xeDd17GkzVBITkvhxe51ovejc ySo/zLErNc3ksrUh60YMBKv4L30NEcK2mVsHrjad5MaiYyaol6ISBu/UPDNxQnNb nBxfekg3H1tXMZmA0al7yE11DhJNKgHvo3jl1qoZgqNYu+bA89rnI4G0e1SEY8m+ +rfPww/agoLI3H6m7E0C7CArfdHP2YBD1lepyvGyeHQsKR8Oo6L5iP1yTnApXYRw okEJ9/zPGgiHJV2DnbmmeqVm9/PqoKF+fy8H62lbQ4pe8hy2niXdTsjPg8uJVxFL TkUw1MKB3Wk55tj695hjGDqvQgO9A4BTHIP/eLGcHrCPduc0PYPKyaU3NA5ssW/m PTIuzzI6OxnCaxNvqlMudEnx456IrmH2G98mvi5N69Ey+kB0ZQIvAHO16YVErxP6 GDMz6PgIW5JaMlbD9/lPQ4l7P0ZNBZHcUp5haKQd1SCoYYe/O/QHRF9Ym0GvAB0B 6++ZWPZDBhI5jAwj1P8YO/DqwaXabcqvnuEq0FgSxtfiB72x7Iw= =Ob74 -----END PGP SIGNATURE-----
