Source: intel-microcode
Version: 3.20251111.1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 3.20250812.1~deb13u1
Control: found -1 3.20251111.1~deb13u1
Control: found -1 3.20250812.1~deb12u1
Control: found -1 3.20251111.1~deb12u1

Hi,

The following vulnerability was published for intel-microcode.

CVE-2025-31648[0]:
| Improper handling of values in the microcode flow for some Intel(R)
| Processor Family may allow an escalation of privilege. Startup code
| and smm adversary with a privileged user combined with a high
| complexity attack may enable escalation of privilege. This result
| may potentially occur via local access when attack requirements are
| present with special internal knowledge and requires no user
| interaction. The potential vulnerability may impact the
| confidentiality (low), integrity (low) and availability (none) of
| the vulnerable system, resulting in subsequent system
| confidentiality (low), integrity (low) and availability (none)
| impacts.

I think this one can be fixed via next point releases and does not
need a DSA, but in any case let's follow the usual approach to get
fixes in unstable and exposure there first.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-31648
    https://www.cve.org/CVERecord?id=CVE-2025-31648
[1] 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01396.html
[2] 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20260210-rev1

Regards,
Salvatore

Reply via email to