Source: intel-microcode
Version: 3.20250512.1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 3.20250512.1~deb12u1

Hi,

The following vulnerabilities were published for intel-microcode.

CVE-2025-20053[0]:
| Improper buffer restrictions for some Intel(R) Xeon(R) Processor
| firmware with SGX enabled may allow a privileged user to potentially
| enable escalation of privilege via local access.


CVE-2025-20109[1]:
| Improper Isolation or Compartmentalization in the stream cache
| mechanism for some Intel(R) Processors may allow an authenticated
| user to potentially enable escalation of privilege via local access.


CVE-2025-21090[2]:
| Missing reference to active allocated resource for some Intel(R)
| Xeon(R) processors may allow an authenticated user to potentially
| enable denial of service via local access.


CVE-2025-22839[3]:
| Insufficient granularity of access control in the OOB-MSM for some
| Intel(R) Xeon(R) 6 Scalable processors may allow a privileged user
| to potentially enable escalation of privilege via adjacent access.


CVE-2025-22840[4]:
| Sequence of processor instructions leads to unexpected behavior for
| some Intel(R) Xeon(R) 6 Scalable processors may allow an
| authenticated user to potentially enable escalation of privilege via
| local access


CVE-2025-22889[5]:
| Improper handling of overlap between protected memory ranges for
| some Intel(R) Xeon(R) 6 processor with Intel(R) TDX may allow a
| privileged user to potentially enable escalation of privilege via
| local access.


CVE-2025-24305[6]:
| Insufficient control flow management in the Alias Checking Trusted
| Module (ACTM) firmware for some Intel(R) Xeon(R) processors may
| allow a privileged user to potentially enable escalation of
| privilege via local access.


CVE-2025-26403[7]:
| Out-of-bounds write in the memory subsystem for some Intel(R)
| Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX may
| allow a privileged user to potentially enable escalation of
| privilege via local access.


CVE-2025-32086[8]:
| Improperly implemented security check for standard in the DDRIO
| configuration for some Intel(R) Xeon(R) 6 Processors when using
| Intel(R) SGX or Intel(R) TDX may allow a privileged user to
| potentially enable escalation of privilege via local access.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-20053
    https://www.cve.org/CVERecord?id=CVE-2025-20053
[1] https://security-tracker.debian.org/tracker/CVE-2025-20109
    https://www.cve.org/CVERecord?id=CVE-2025-20109
[2] https://security-tracker.debian.org/tracker/CVE-2025-21090
    https://www.cve.org/CVERecord?id=CVE-2025-21090
[3] https://security-tracker.debian.org/tracker/CVE-2025-22839
    https://www.cve.org/CVERecord?id=CVE-2025-22839
[4] https://security-tracker.debian.org/tracker/CVE-2025-22840
    https://www.cve.org/CVERecord?id=CVE-2025-22840
[5] https://security-tracker.debian.org/tracker/CVE-2025-22889
    https://www.cve.org/CVERecord?id=CVE-2025-22889
[6] https://security-tracker.debian.org/tracker/CVE-2025-24305
    https://www.cve.org/CVERecord?id=CVE-2025-24305
[7] https://security-tracker.debian.org/tracker/CVE-2025-26403
    https://www.cve.org/CVERecord?id=CVE-2025-26403
[8] https://security-tracker.debian.org/tracker/CVE-2025-32086
    https://www.cve.org/CVERecord?id=CVE-2025-32086
[9] 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250812

Regards,
Salvatore

Reply via email to