[openwrt/openwrt] intel-microcode: update to 20250812

LEDE Commits lede-commits at lists.infradead.org
Wed Sep 17 14:05:04 PDT 2025


hauke pushed a commit to openwrt/openwrt.git, branch main:
https://git.openwrt.org/af3ae2ae84f0eda22ea9034f4746a54abf529d52

commit af3ae2ae84f0eda22ea9034f4746a54abf529d52
Author: John Audia <therealgraysky at proton.me>
AuthorDate: Sun Sep 14 02:16:41 2025 -0400

    intel-microcode: update to 20250812
    
    New upstream release. Debian changelog:
    * New upstream microcode datafile 20250812 (closes: #1110983, #1112168)
    - Mitgations for INTEL-SA-01249 (processor Stream Cache):
      CVE-2025-20109: Improper Isolation or Compartmentalization in the
      stream cache mechanism for some Intel Processors may allow an
      authenticated user to potentially enable escalation of privilege via
      local access.  Intel also disclosed that several processors models
      had already received this mitigation on the previous microcode
      release, 20250512.
    - Mitigations for INTEL-SA-01308:
      CVE-2025-22840: Sequence of processor instructions leads to
      unexpected behavior for some Intel Xeon 6 Scalable processors may
      allow an authenticated user to potentially enable escalation of
      privilege via local access.
    - Mitigations for INTEL-SA-01310 (OOBM services module):
      CVE-2025-22839: Insufficient granularity of access control in the
      OOB-MSM for some Intel Xeon 6 Scalable processors may allow a
      privileged user to potentially enable escalation of privilege via
      adjacent access.
    - Mitigations for INTEL-SA-01311 (Intel TDX):
      CVE-2025-22889: Improper handling of overlap between protected
      memory ranges for some Intel Xeon 6 processors with Intel TDX may
      allow a privileged user to potentially enable escalation of
      privilege via local access.
    - Mitigations for INTEL-SA-01313:
      CVE-2025-20053: Improper buffer restrictions for some Intel Xeon
      Processor firmware with SGX enabled may allow a privileged user to
      potentially enable escalation of privilege via local access.
      CVE-2025-21090: Missing reference to active allocated resource for
      some Intel Xeon processors may allow an authenticated user to
      potentially enable denial of service via local access.
      CVE-2025-24305: Insufficient control flow management in the Alias
      Checking Trusted Module (ACTM) firmware for some Intel Xeon
      processors may allow a privileged user to potentially enable
      escalation of privilege via local access.
    - Mitigations for INTEL-SA-01367 (Intel SGX, TDX):
      CVE-2025-26403: Out-of-bounds write in the memory subsystem for some
      Intel Xeon 6 processors when using Intel SGX or Intel TDX may allow
      a privileged user to potentially enable escalation of privilege via
      local access.
      CVE-2025-32086: Improperly implemented security check for standard
      in the DDRIO configuration for some Intel Xeon 6 Processors when
      using Intel SGX or Intel TDX may allow a privileged user to
      potentially enable escalation of privilege via local access.
    - Fixes for unspecified functional issues on several Intel Core and
      Intel Xeon processor models.
    * Updated microcodes:
      sig 0x000606a6, pf_mask 0x87, 2025-03-11, rev 0xd000410, size 309248
      sig 0x000606c1, pf_mask 0x10, 2025-03-06, rev 0x10002e0, size 301056
      sig 0x000806f8, pf_mask 0x87, 2025-04-04, rev 0x2b000643, size 592896
      sig 0x000806f7, pf_mask 0x87, 2025-04-04, rev 0x2b000643
      sig 0x000806f6, pf_mask 0x87, 2025-04-04, rev 0x2b000643
      sig 0x000806f5, pf_mask 0x87, 2025-04-04, rev 0x2b000643
      sig 0x000806f4, pf_mask 0x87, 2025-04-04, rev 0x2b000643
      sig 0x000806f8, pf_mask 0x10, 2025-04-08, rev 0x2c000401, size 625664
      sig 0x000806f6, pf_mask 0x10, 2025-04-08, rev 0x2c000401
      sig 0x000806f5, pf_mask 0x10, 2025-04-08, rev 0x2c000401
      sig 0x000806f4, pf_mask 0x10, 2025-04-08, rev 0x2c000401
      sig 0x000a06a4, pf_mask 0xe6, 2025-03-19, rev 0x0025, size 140288
      sig 0x000a06d1, pf_mask 0x95, 2025-05-15, rev 0x10003d0, size 1667072
      sig 0x000a06d1, pf_mask 0x20, 2025-05-15, rev 0xa000100, size 1638400
      sig 0x000a06f3, pf_mask 0x01, 2025-05-03, rev 0x3000362, size 1530880
      sig 0x000b06a2, pf_mask 0xe0, 2025-02-24, rev 0x4129, size 224256
      sig 0x000b06a3, pf_mask 0xe0, 2025-02-24, rev 0x4129
      sig 0x000b06a8, pf_mask 0xe0, 2025-02-24, rev 0x4129
      sig 0x000b06d1, pf_mask 0x80, 2025-05-21, rev 0x0123, size 80896
      sig 0x000c0662, pf_mask 0x82, 2025-05-14, rev 0x0119, size 90112
      sig 0x000c06a2, pf_mask 0x82, 2025-05-14, rev 0x0119
      sig 0x000c0652, pf_mask 0x82, 2025-05-14, rev 0x0119
      sig 0x000c0664, pf_mask 0x82, 2025-05-14, rev 0x0119
      sig 0x000c06f2, pf_mask 0x87, 2025-04-15, rev 0x210002b3, size 564224
      sig 0x000c06f1, pf_mask 0x87, 2025-04-15, rev 0x210002b3
    
    Build system: x86/64
    Build-tested: x86/64-glibc
    Run-tested: x86/64-glibc (Intel N150 PC)
    
    Signed-off-by: John Audia <therealgraysky at proton.me>
    Link: https://github.com/openwrt/openwrt/pull/20045
    Signed-off-by: Hauke Mehrtens <hauke at hauke-m.de>
---
 package/firmware/intel-microcode/Makefile | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/package/firmware/intel-microcode/Makefile b/package/firmware/intel-microcode/Makefile
index ccc68040e4..11ff6ef544 100644
--- a/package/firmware/intel-microcode/Makefile
+++ b/package/firmware/intel-microcode/Makefile
@@ -8,12 +8,12 @@
 include $(TOPDIR)/rules.mk
 
 PKG_NAME:=intel-microcode
-PKG_VERSION:=20250512
+PKG_VERSION:=20250812
 PKG_RELEASE:=1
 
 PKG_SOURCE:=intel-microcode_3.$(PKG_VERSION).1.tar.xz
 PKG_SOURCE_URL:=@DEBIAN/pool/non-free-firmware/i/intel-microcode/
-PKG_HASH:=5773cf59867d90f4f5479bae973ac85f1cce2f7ae407645ec29c4ec1ba60f8e2
+PKG_HASH:=9db8c9d34ee07938500e12c61c1a96815fdccab8e268658736a0afbb5caca2c7
 PKG_BUILD_DIR:=$(BUILD_DIR)/intel-microcode-3.$(PKG_VERSION).1
 PKG_CPE_ID:=cpe:/a:intel:microcode
 




More information about the lede-commits mailing list