MGASA-2026-0043

Source
https://advisories.mageia.org/MGASA-2026-0043.html
Import Source
https://advisories.mageia.org/MGASA-2026-0043.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2026-0043
Related
Published
2026-02-18T16:17:22Z
Modified
2026-02-18T16:31:44.185536Z
Summary
Updated microcode packages fix security vulnerabilities
Details

The updated package updates AMD CPUs microcodes and fixes security vulnerabilities in Intel CPUs microcodes: Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access. (CVE-2024-24853) Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts. (CVE-2025-31648)

References
Credits

Affected packages

Mageia:9 / microcode

Package

Name
microcode
Purl
pkg:rpm/mageia/microcode?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.20260210-1.mga9.nonfree

Ecosystem specific

{
    "section": "nonfree"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2026-0043.json"