Skip to content

update: intel-microcode #2016

@dongsupark

Description

@dongsupark

Name: intel-microcode
CVEs: CVE-2025-31648
CVSSs: 3.9
Action Needed: update to >= 20260210

Summary: Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts.

Note: release note of 20260210 says Updated security updates for INTEL-SA-01083 originally published on Aug 13, 2024 [INTEL-SA-01083](https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-01083.html), CVE-2024-24853 (CVSS3 7.2). Am not sure how much the incomplete fix would impact due to limited info.

refmap.gentoo: TBD

Metadata

Metadata

Assignees

No one assigned

    Labels

    advisorysecurity advisorycvss/LOW< 4 assessed CVSSsecuritysecurity concerns

    Type

    No type

    Projects

    Status

    🪵Backlog

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions