OESA-2025-1171

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1171
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-1171.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-1171
Upstream
Published
2025-02-21T13:37:17Z
Modified
2025-08-12T05:38:47.581366Z
Summary
microcode_ctl security update
Details

This is a tool to transform and deploy microcode update for x86 CPUs.

Security Fix(es):

Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2023-34440)

Improper input validation in UEFI firmware for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2023-43758)

Improper input validation in XmlCli feature for UEFI firmware for some Intel(R) processors may allow privileged user to potentially enable escalation of privilege via local access.(CVE-2024-24582)

Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.(CVE-2024-28047)

Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2024-28127)

Improper input validation in UEFI firmware CseVariableStorageSmm for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2024-29214)

Improper Finite State Machines (FSMs) in Hardware Logic for some Intel(R) Processors may allow privileged user to potentially enable denial of service via local access.(CVE-2024-31068)

Improper initialization in UEFI firmware OutOfBandXML module in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.(CVE-2024-31157)

Improper access control in the EDECCSSA user leaf function for some Intel(R) Processors with Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access.(CVE-2024-36293)

Sequence of processor instructions leads to unexpected behavior in the Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable denial of service via local access.(CVE-2024-37020)

Insufficient granularity of access control in UEFI firmware in some Intel(R) processors may allow a authenticated user to potentially enable denial of service via local access.(CVE-2024-39279)

Improper handling of physical or environmental conditions in some Intel(R) Processors may allow an authenticated user to enable denial of service via local access.(CVE-2024-39355)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / microcode_ctl

Package

Name
microcode_ctl
Purl
pkg:rpm/openEuler/microcode_ctl&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20250211-1.oe2003sp4

Ecosystem specific

{
    "x86_64": [
        "microcode_ctl-20250211-1.oe2003sp4.x86_64.rpm"
    ],
    "src": [
        "microcode_ctl-20250211-1.oe2003sp4.src.rpm"
    ]
}

openEuler:22.03-LTS-SP3 / microcode_ctl

Package

Name
microcode_ctl
Purl
pkg:rpm/openEuler/microcode_ctl&distro=openEuler-22.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20250211-1.oe2203sp3

Ecosystem specific

{
    "x86_64": [
        "microcode_ctl-20250211-1.oe2203sp3.x86_64.rpm"
    ],
    "src": [
        "microcode_ctl-20250211-1.oe2203sp3.src.rpm"
    ]
}

openEuler:22.03-LTS-SP4 / microcode_ctl

Package

Name
microcode_ctl
Purl
pkg:rpm/openEuler/microcode_ctl&distro=openEuler-22.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20250211-1.oe2203sp4

Ecosystem specific

{
    "x86_64": [
        "microcode_ctl-20250211-1.oe2203sp4.x86_64.rpm"
    ],
    "src": [
        "microcode_ctl-20250211-1.oe2203sp4.src.rpm"
    ]
}

openEuler:24.03-LTS / microcode_ctl

Package

Name
microcode_ctl
Purl
pkg:rpm/openEuler/microcode_ctl&distro=openEuler-24.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20250211-1.oe2403sp1

Ecosystem specific

{
    "x86_64": [
        "microcode_ctl-20250211-1.oe2403.x86_64.rpm",
        "microcode_ctl-20250211-1.oe2403sp1.x86_64.rpm"
    ],
    "src": [
        "microcode_ctl-20250211-1.oe2403.src.rpm",
        "microcode_ctl-20250211-1.oe2403sp1.src.rpm"
    ]
}

openEuler:24.03-LTS-SP1 / microcode_ctl

Package

Name
microcode_ctl
Purl
pkg:rpm/openEuler/microcode_ctl&distro=openEuler-24.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
20250211-1.oe2403sp1

Ecosystem specific

{
    "x86_64": [
        "microcode_ctl-20250211-1.oe2403sp1.x86_64.rpm"
    ],
    "src": [
        "microcode_ctl-20250211-1.oe2403sp1.src.rpm"
    ]
}