Security Fix(es):
Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2025-20053)
Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.(CVE-2025-20109)
Missing reference to active allocated resource for some Intel(R) Xeon(R) processors may allow an authenticated user to potentially enable denial of service via local access.(CVE-2025-21090)
Insufficient granularity of access control in the OOB-MSM for some Intel(R) Xeon(R) 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access.(CVE-2025-22839)
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access(CVE-2025-22840)
Improper handling of overlap between protected memory ranges for some Intel(R) Xeon(R) 6 processor with Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2025-22889)
Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2025-24305)
Out-of-bounds write in the memory subsystem for some Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2025-26403)
Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.(CVE-2025-32086)
{ "severity": "High" }
{ "src": [ "microcode_ctl-20250812-1.oe2403sp1.src.rpm", "microcode_ctl-20250812-1.oe2403sp2.src.rpm", "microcode_ctl-20250812-1.oe2403.src.rpm" ], "x86_64": [ "microcode_ctl-20250812-1.oe2403sp1.x86_64.rpm", "microcode_ctl-20250812-1.oe2403sp2.x86_64.rpm", "microcode_ctl-20250812-1.oe2403.x86_64.rpm" ] }