-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sat, 13 Sep 2025 18:30:55 -0300
Source: intel-microcode
Architecture: source
Version: 3.20250812.1
Distribution: unstable
Urgency: medium
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
Closes: 1110983 1112168
Changes:
intel-microcode (3.20250812.1) unstable; urgency=medium
.
[ Henrique de Moraes Holschuh ]
* New upstream microcode datafile 20250812 (closes: #1110983, #1112168)
- Mitgations for INTEL-SA-01249 (processor Stream Cache):
CVE-2025-20109: Improper Isolation or Compartmentalization in the
stream cache mechanism for some Intel Processors may allow an
authenticated user to potentially enable escalation of privilege via
local access. Intel also disclosed that several processors models
had already received this mitigation on the previous microcode
release, 20250512.
- Mitigations for INTEL-SA-01308:
CVE-2025-22840: Sequence of processor instructions leads to
unexpected behavior for some Intel Xeon 6 Scalable processors may
allow an authenticated user to potentially enable escalation of
privilege via local access.
- Mitigations for INTEL-SA-01310 (OOBM services module):
CVE-2025-22839: Insufficient granularity of access control in the
OOB-MSM for some Intel Xeon 6 Scalable processors may allow a
privileged user to potentially enable escalation of privilege via
adjacent access.
- Mitigations for INTEL-SA-01311 (Intel TDX):
CVE-2025-22889: Improper handling of overlap between protected
memory ranges for some Intel Xeon 6 processors with Intel TDX may
allow a privileged user to potentially enable escalation of
privilege via local access.
- Mitigations for INTEL-SA-01313:
CVE-2025-20053: Improper buffer restrictions for some Intel Xeon
Processor firmware with SGX enabled may allow a privileged user to
potentially enable escalation of privilege via local access.
CVE-2025-21090: Missing reference to active allocated resource for
some Intel Xeon processors may allow an authenticated user to
potentially enable denial of service via local access.
CVE-2025-24305: Insufficient control flow management in the Alias
Checking Trusted Module (ACTM) firmware for some Intel Xeon
processors may allow a privileged user to potentially enable
escalation of privilege via local access.
- Mitigations for INTEL-SA-01367 (Intel SGX, TDX):
CVE-2025-26403: Out-of-bounds write in the memory subsystem for some
Intel Xeon 6 processors when using Intel SGX or Intel TDX may allow
a privileged user to potentially enable escalation of privilege via
local access.
CVE-2025-32086: Improperly implemented security check for standard
in the DDRIO configuration for some Intel Xeon 6 Processors when
using Intel SGX or Intel TDX may allow a privileged user to
potentially enable escalation of privilege via local access.
- Fixes for unspecified functional issues on several Intel Core and
Intel Xeon processor models.
* Updated microcodes:
sig 0x000606a6, pf_mask 0x87, 2025-03-11, rev 0xd000410, size 309248
sig 0x000606c1, pf_mask 0x10, 2025-03-06, rev 0x10002e0, size 301056
sig 0x000806f8, pf_mask 0x87, 2025-04-04, rev 0x2b000643, size 592896
sig 0x000806f7, pf_mask 0x87, 2025-04-04, rev 0x2b000643
sig 0x000806f6, pf_mask 0x87, 2025-04-04, rev 0x2b000643
sig 0x000806f5, pf_mask 0x87, 2025-04-04, rev 0x2b000643
sig 0x000806f4, pf_mask 0x87, 2025-04-04, rev 0x2b000643
sig 0x000806f8, pf_mask 0x10, 2025-04-08, rev 0x2c000401, size 625664
sig 0x000806f6, pf_mask 0x10, 2025-04-08, rev 0x2c000401
sig 0x000806f5, pf_mask 0x10, 2025-04-08, rev 0x2c000401
sig 0x000806f4, pf_mask 0x10, 2025-04-08, rev 0x2c000401
sig 0x000a06a4, pf_mask 0xe6, 2025-03-19, rev 0x0025, size 140288
sig 0x000a06d1, pf_mask 0x95, 2025-05-15, rev 0x10003d0, size 1667072
sig 0x000a06d1, pf_mask 0x20, 2025-05-15, rev 0xa000100, size 1638400
sig 0x000a06f3, pf_mask 0x01, 2025-05-03, rev 0x3000362, size 1530880
sig 0x000b06a2, pf_mask 0xe0, 2025-02-24, rev 0x4129, size 224256
sig 0x000b06a3, pf_mask 0xe0, 2025-02-24, rev 0x4129
sig 0x000b06a8, pf_mask 0xe0, 2025-02-24, rev 0x4129
sig 0x000b06d1, pf_mask 0x80, 2025-05-21, rev 0x0123, size 80896
sig 0x000c0662, pf_mask 0x82, 2025-05-14, rev 0x0119, size 90112
sig 0x000c06a2, pf_mask 0x82, 2025-05-14, rev 0x0119
sig 0x000c0652, pf_mask 0x82, 2025-05-14, rev 0x0119
sig 0x000c0664, pf_mask 0x82, 2025-05-14, rev 0x0119
sig 0x000c06f2, pf_mask 0x87, 2025-04-15, rev 0x210002b3, size 564224
sig 0x000c06f1, pf_mask 0x87, 2025-04-15, rev 0x210002b3
* update entry for 3.20250512.1 with new information
* source: update symlinks to reflect id of the latest release, 20250812
.
[ Ben Hutchings ]
* debian/tests/initramfs: Update to work with forky's initramfs-tools.
In version 0.149 of initramfs-tools, unmkinitramfs was changed to no
longer create early/ and main/ subdirectories. Update the microcode
file check to work with both old and new behaviours.
Checksums-Sha1:
e30dc625db1cf7226f2cfc20fb2c43767fe9fd3b 1879 intel-microcode_3.20250812.1.dsc
9394d6f6839d2197be6d963fd326eaffd269e524 11999812 intel-microcode_3.20250812.1.tar.xz
8e955f29fd137aef21bb0ae18fbd1e078dcb8fa3 6722 intel-microcode_3.20250812.1_amd64.buildinfo
Checksums-Sha256:
0bf24f919efec6af0608cc479b2d2d098ff5ad4120109b710fc2d7f4a8c10ea4 1879 intel-microcode_3.20250812.1.dsc
9db8c9d34ee07938500e12c61c1a96815fdccab8e268658736a0afbb5caca2c7 11999812 intel-microcode_3.20250812.1.tar.xz
e68162d2be622d8ad9f5e17d7ce479746b6e9309808a345311ee8e7a02f7274b 6722 intel-microcode_3.20250812.1_amd64.buildinfo
Files:
03334881bb9461ef3fa5a575fd37d828 1879 non-free-firmware/admin standard intel-microcode_3.20250812.1.dsc
0dc7aa4d659abadf97bb095c2a2985da 11999812 non-free-firmware/admin standard intel-microcode_3.20250812.1.tar.xz
bf31b5468001fd64e695ef0b37b418a1 6722 non-free-firmware/admin standard intel-microcode_3.20250812.1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=gFTK
-----END PGP SIGNATURE-----
Attachment:
pgpLH2eH_qXxf.pgp
Description: PGP signature