Home / mailings [USN-7866-1] Intel Microcode vulnerabilities
Posted on 11 November 2025
Ubuntu Security==========================================================================Ubuntu Security Notice USN-7866-1
November 10, 2025
intel-microcode vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in Intel Microcode.
Software Description:
- intel-microcode: Processor microcode for Intel CPUs
Details:
Barak Gross discovered that some Intel® Xeon® processors with SGX enabled
did not properly handle buffer restrictions. A local authenticated user
could potentially use this issue to escalate their privileges.
(CVE-2025-20053)
Avinash Maddy discovered that some Intel® processors did not properly
isolate or compartmentalize the stream cache mechanisms. A local
authenticated user could potentially use this issue to escalate their
privileges. (CVE-2025-20109)
Joseph Nuzman discovered that some Intel® Xeon® processors did not properly
manage references to active allocate resources. A local authenticated user
could potentially use this issue to cause a denial of service (system
crash). (CVE-2025-21090)
It was discovered that some Intel® Xeon® 6 processors did not properly
provide sufficient granularity of access control in the out of band
management service module (OOB-MSM). An authenticated user could
potentially use this issue to escalate their privileges. (CVE-2025-22839)
It was discovered that some Intel® Xeon® 6 Scalable processors did not
properly handle a specific sequence of processor instructions, leading to
unexpected behavior. A local authenticated user could potentially use this
issue to escalate their privileges. (CVE-2025-22840)
Joseph Nuzman discovered that some Intel® Xeon® 6 processors with Intel®
Trust Domain Extensions (Intel® TDX) did not properly handle overlap
between protected memory ranges. A local authenticated user could
potentially use this issue to escalate their privileges. (CVE-2025-22889)
Avraham Shalev discovered that some Intel® Xeon® processors did not
properly provide sufficient control flow management in the Alias Checking
Trusted Module (ACTM) firmware. A local authenticated user could
potentially use this issue to escalate their privileges. (CVE-2025-24305)
Aviv Eisen and Avraham Shalev discovered that some Intel® Xeon® 6
processors when using Intel® SGX or Intel® TDX did not properly protect
against out-of-bounds writes in the memory subsystem. A local authenticated
user could potentially use this issue to escalate their privileges.
(CVE-2025-26403)
Aviv Eisen and Avraham Shalev discovered that some Intel® Xeon® 6
processors when using Intel® SGX or Intel® TDX did not properly implement
security checks in the DDRIO configuration. A local authenticated user
could potentially use this issue to escalate their privileges.
(CVE-2025-32086)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
intel-microcode 3.20250812.0ubuntu0.25.10.1
Ubuntu 25.04
intel-microcode 3.20250812.0ubuntu0.25.04.1
Ubuntu 24.04 LTS
intel-microcode 3.20250812.0ubuntu0.24.04.1
Ubuntu 22.04 LTS
intel-microcode 3.20250812.0ubuntu0.22.04.1
Ubuntu 20.04 LTS
intel-microcode 3.20250812.0ubuntu0.20.04.1+esm1
Available with Ubuntu Pro
Ubuntu 18.04 LTS
intel-microcode 3.20250812.0ubuntu0.18.04.1+esm1
Available with Ubuntu Pro
Ubuntu 16.04 LTS
intel-microcode 3.20250812.0ubuntu0.16.04.1+esm1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make all
the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7866-1
CVE-2025-20053, CVE-2025-20109, CVE-2025-21090, CVE-2025-22839,
CVE-2025-22840, CVE-2025-22889, CVE-2025-24305, CVE-2025-26403,
CVE-2025-32086
Package Information:
https://launchpad.net/ubuntu/+source/intel-microcode/3.20250812.0ubuntu0.25.10.1
https://launchpad.net/ubuntu/+source/intel-microcode/3.20250812.0ubuntu0.25.04.1
https://launchpad.net/ubuntu/+source/intel-microcode/3.20250812.0ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/intel-microcode/3.20250812.0ubuntu0.22.04.1
--===============0377897840192235568==Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
