Ubuntu alert USN-7866-1 (intel-microcode)
| From: | noreply+usn-bot@canonical.com | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-7866-1] Intel Microcode vulnerabilities | |
| Date: | Tue, 11 Nov 2025 00:08:30 +0000 | |
| Message-ID: | <E1vIbvy-0003Ei-51@lists.ubuntu.com> |
========================================================================== Ubuntu Security Notice USN-7866-1 November 10, 2025 intel-microcode vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 25.10 - Ubuntu 25.04 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Several security issues were fixed in Intel Microcode. Software Description: - intel-microcode: Processor microcode for Intel CPUs Details: Barak Gross discovered that some Intel® Xeon® processors with SGX enabled did not properly handle buffer restrictions. A local authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-20053) Avinash Maddy discovered that some Intel® processors did not properly isolate or compartmentalize the stream cache mechanisms. A local authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-20109) Joseph Nuzman discovered that some Intel® Xeon® processors did not properly manage references to active allocate resources. A local authenticated user could potentially use this issue to cause a denial of service (system crash). (CVE-2025-21090) It was discovered that some Intel® Xeon® 6 processors did not properly provide sufficient granularity of access control in the out of band management service module (OOB-MSM). An authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-22839) It was discovered that some Intel® Xeon® 6 Scalable processors did not properly handle a specific sequence of processor instructions, leading to unexpected behavior. A local authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-22840) Joseph Nuzman discovered that some Intel® Xeon® 6 processors with Intel® Trust Domain Extensions (Intel® TDX) did not properly handle overlap between protected memory ranges. A local authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-22889) Avraham Shalev discovered that some Intel® Xeon® processors did not properly provide sufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware. A local authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-24305) Aviv Eisen and Avraham Shalev discovered that some Intel® Xeon® 6 processors when using Intel® SGX or Intel® TDX did not properly protect against out-of-bounds writes in the memory subsystem. A local authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-26403) Aviv Eisen and Avraham Shalev discovered that some Intel® Xeon® 6 processors when using Intel® SGX or Intel® TDX did not properly implement security checks in the DDRIO configuration. A local authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-32086) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 25.10 intel-microcode 3.20250812.0ubuntu0.25.10.1 Ubuntu 25.04 intel-microcode 3.20250812.0ubuntu0.25.04.1 Ubuntu 24.04 LTS intel-microcode 3.20250812.0ubuntu0.24.04.1 Ubuntu 22.04 LTS intel-microcode 3.20250812.0ubuntu0.22.04.1 Ubuntu 20.04 LTS intel-microcode 3.20250812.0ubuntu0.20.04.1+esm1 Available with Ubuntu Pro Ubuntu 18.04 LTS intel-microcode 3.20250812.0ubuntu0.18.04.1+esm1 Available with Ubuntu Pro Ubuntu 16.04 LTS intel-microcode 3.20250812.0ubuntu0.16.04.1+esm1 Available with Ubuntu Pro After a standard system update you need to reboot your computer to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7866-1 CVE-2025-20053, CVE-2025-20109, CVE-2025-21090, CVE-2025-22839, CVE-2025-22840, CVE-2025-22889, CVE-2025-24305, CVE-2025-26403, CVE-2025-32086 Package Information: https://launchpad.net/ubuntu/+source/intel-microcode/3.20... https://launchpad.net/ubuntu/+source/intel-microcode/3.20... https://launchpad.net/ubuntu/+source/intel-microcode/3.20... https://launchpad.net/ubuntu/+source/intel-microcode/3.20...
Attachment: signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmkSfkgACgkQcpJm3tlz hgHfHxAAzogUNf8GBnakGXb1N8Va+uZfLHbK8WhBSSbHHEjfjer4BCpGiBLI6BY3 LJjMXW8amcziTA9c20XN0gQXM0qhLC7QvFCfr+oxPKxcsL+abxDrLEmV69lRnKmb wDMBCr+VOk+1M3SMwzHXJS18UbA0+P4WNTgs1CEW2lwy2yhXIxQ6IrHHMhv+ucNk piGq0eHoQnlh2fcQJssDIv3DRW9R8Z27VwDXWA05RhQEdRPiu+vKkhSAEIMKBUrV 6OmfKJUsstNPXj6u1WMwbkgpaQyfPO7VDTstFXui3nTIPW40V6fks/Ao7iFSOxOE EBLVf8PwAjM+kqTMl+AxtzvKlXFQ9K1ZBokGv+1lgsqZ4iuELZVzBsoyC0f3v+aV ycpslKabS5vgLqmKzCjugwNiZJHnqibpXW3LGwssvGBrrLiU8L0sUM1kpoDt2Pr7 aXml3We+BaiLPLzZWfw7/rJOWQrEnzEjc+Pt2l+yO3a19YwMG1f0xtC/GLY2h3C5 lbQGEj3+hSPkocOi8JPLguSKWnnr+E87wluFgTI4JH8lN7dPlWmb6NVpE0F24BfE FHT6VGv1/qzDVAE5/jvEFrcyZXlH9rkohf9BljizEaQJkmg2JngrKkHlvYic0FV1 InU5qOzJSyTGfGVgB4TkXl/Bi0nepD1qtBbrJ0CmxTWQFziQTWc= =1seJ -----END PGP SIGNATURE-----
