UbuntuUpdates.org

Package "intel-microcode"

Name: intel-microcode

Description:

Processor microcode firmware for Intel CPUs

Latest version: 3.20250812.0ubuntu0.25.10.1
Release: questing (25.10)
Level: security
Repository: main
Homepage: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files

Links


Download "intel-microcode"


Other versions of "intel-microcode" in Questing

Repository Area Version
base main 3.20250512.1ubuntu1
updates main 3.20250812.0ubuntu0.25.10.1

Changelog

Version: 3.20250812.0ubuntu0.25.10.1 2025-11-11 00:07:10 UTC

  intel-microcode (3.20250812.0ubuntu0.25.10.1) questing-security; urgency=medium

  * SECURITY UPDATE: New upstream microcode datafile 20250812
    - Updated microcodes:
      sig 0x000606a6, pf_mask 0x87, 2025-03-11, rev 0xd000410, size 309248
      sig 0x000606c1, pf_mask 0x10, 2025-03-06, rev 0x10002e0, size 301056
      sig 0x000806f4, pf_mask 0x10, 2025-04-08, rev 0x2c000401, size 625664
      sig 0x000806f4, pf_mask 0x87, 2025-04-04, rev 0x2b000643, size 592896
      sig 0x000806f5, pf_mask 0x10, 2025-04-08, rev 0x2c000401, size 625664
      sig 0x000806f5, pf_mask 0x87, 2025-04-04, rev 0x2b000643, size 592896
      sig 0x000806f6, pf_mask 0x10, 2025-04-08, rev 0x2c000401, size 625664
      sig 0x000806f6, pf_mask 0x87, 2025-04-04, rev 0x2b000643, size 592896
      sig 0x000806f7, pf_mask 0x87, 2025-04-04, rev 0x2b000643, size 592896
      sig 0x000806f8, pf_mask 0x10, 2025-04-08, rev 0x2c000401, size 625664
      sig 0x000806f8, pf_mask 0x87, 2025-04-04, rev 0x2b000643, size 592896
      sig 0x000a06a4, pf_mask 0xe6, 2025-03-19, rev 0x0025, size 140288
      sig 0x000a06d1, pf_mask 0x20, 2025-05-15, rev 0xa000100, size 1638400
      sig 0x000a06d1, pf_mask 0x95, 2025-05-15, rev 0x10003d0, size 1667072
      sig 0x000a06f3, pf_mask 0x01, 2025-05-03, rev 0x3000362, size 1530880
      sig 0x000b06a2, pf_mask 0xe0, 2025-02-24, rev 0x4129, size 224256
      sig 0x000b06a3, pf_mask 0xe0, 2025-02-24, rev 0x4129, size 224256
      sig 0x000b06a8, pf_mask 0xe0, 2025-02-24, rev 0x4129, size 224256
      sig 0x000b06d1, pf_mask 0x80, 2025-05-21, rev 0x0123, size 80896
      sig 0x000c0652, pf_mask 0x82, 2025-05-14, rev 0x0119, size 90112
      sig 0x000c0662, pf_mask 0x82, 2025-05-14, rev 0x0119, size 90112
      sig 0x000c0664, pf_mask 0x82, 2025-05-14, rev 0x0119, size 90112
      sig 0x000c06a2, pf_mask 0x82, 2025-05-14, rev 0x0119, size 90112
      sig 0x000c06f1, pf_mask 0x87, 2025-04-15, rev 0x210002b3, size 564224
      sig 0x000c06f2, pf_mask 0x87, 2025-04-15, rev 0x210002b3, size 564224
    - CVE-2025-20109 (INTEL-SA-01249)
    - CVE-2025-22840 (INTEL-SA-01308)
    - CVE-2025-22839 (INTEL-SA-01310)
    - CVE-2025-22889 (INTEL-SA-01311)
    - CVE-2025-21090 (INTEL-SA-01313)
    - CVE-2025-20053 (INTEL-SA-01313)
    - CVE-2025-24305 (INTEL-SA-01313)
    - CVE-2025-26403 (INTEL-SA-01367)
    - CVE-2025-32086 (INTEL-SA-01367)

 -- Rodrigo Figueiredo Zaiden <email address hidden> Tue, 28 Oct 2025 15:24:30 -0300

CVE-2025-20109 Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel(R) Processors may allow an authenticated user to potentially
CVE-2025-22840 Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to po
CVE-2025-22839 Insufficient granularity of access control in the OOB-MSM for some Intel(R) Xeon(R) 6 Scalable processors may allow a privileged user to potentially
CVE-2025-22889 Improper handling of overlap between protected memory ranges for some Intel(R) Xeon(R) 6 processor with Intel(R) TDX may allow a privileged user to p
CVE-2025-21090 Missing reference to active allocated resource for some Intel(R) Xeon(R) processors may allow an authenticated user to potentially enable denial of s
CVE-2025-20053 Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with SGX enabled may allow a privileged user to potentially enable escalati
CVE-2025-24305 Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged
CVE-2025-26403 Out-of-bounds write in the memory subsystem for some Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged use
CVE-2025-32086 Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel



About   -   Send Feedback to @ubuntu_updates