#microcode
Technical Deep Dive: Analyzing Ubuntu's USN-7866-1 Intel Microcode Patch.
We've deconstructed the latest critical security advisory for #Ubuntu, covering the CVEs, the exploit mechanisms, and the essential patching procedure. Read more: 👉 tinyurl.com/5n837b24 #Security
Critical Intel Microcode Vulnerabilities Patched in Ubuntu Security Update USN-7866-1
Blog com notícias sobre, Linux, Android, Segurança , etc
tinyurl.com
November 11, 2025 at 9:19 AM
> USN-7866-1: Intel Microcode vulnerabilities
https://ubuntu.com/security/notices/USN-7866-1
USN-7866-1: Intel Microcode vulnerabilities
Barak Gross discovered that some Intel® Xeon® processors with SGX enabled did not properly handle buffer restrictions. A local authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-20053) Avinash Maddy discovered that some Intel® processors did not properly isolate or compartmentalize the stream cache mechanisms. A local authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-20109) Joseph Nuzman discovered that some Intel® Xeon® processors did not properly manage references to active allocate resources. A local authenticated user could potentially use this issue to cause a denial of service (system crash). (CVE-2025-21090) It was discovered that some Intel® Xeon® 6 processors did not properly provide sufficient granularity of access control in the out of band management service module (OOB-MSM). An authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-22839) It was discovered that some Intel® Xeon® 6 Scalable processors did not properly handle a specific sequence of processor instructions, leading to unexpected behavior. A local authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-22840) Joseph Nuzman discovered that some Intel® Xeon® 6 processors with Intel® Trust Domain Extensions (Intel® TDX) did not properly handle overlap between protected memory ranges. A local authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-22889) Avraham Shalev discovered that some Intel® Xeon® processors did not properly provide sufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware. A local authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-24305) Aviv Eisen and Avraham Shalev discovered that some Intel® Xeon® 6 processors when using Intel® SGX or Intel® TDX did not properly protect against out-of-bounds writes in the memory subsystem. A local authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-26403) Aviv Eisen and Avraham Shalev discovered that some Intel® Xeon® 6 processors when using Intel® SGX or Intel® TDX did not properly implement security checks in the DDRIO configuration. A local authenticated user could potentially use this issue to escalate their privileges. (CVE-2025-32086)
ubuntu.com
November 11, 2025 at 3:40 AM
Ubuntu: Intel Microcode Critical Escalation Threat USN-7866-1 Several security issues were fixed in Intel Microcode.

Interest | Match | Feed
Origin
linuxsecurity.com
November 11, 2025 at 2:57 AM
You remember when I was on Windows and I had to hunt down a couple of microcode updates for my processor and it was a pain in the fucking keister?

Yeah, Linux does that automatically for me.
November 11, 2025 at 12:26 AM
Ubuntu: Intel Microcode Critical Escalation Threat USN-7866-1 Several security issues were fixed in Intel Microcode.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match
Ubuntu 7866-1: Intel Microcode Critical Escalation Risks
Fixes for critical issues in Intel microcode across multiple Ubuntu releases. Essential updates for privilege escalation risks.
linuxsecurity.com
November 11, 2025 at 2:58 AM
That's more similar to the parsed regex generated from oracle that MTGO parsed to make every single card's microcode definitions.

Now THAT thing was awe inspiring.
November 10, 2025 at 11:43 PM
ITS BACK
ITS BACK
ITS CRASHING AGAIN

apparently its microcode something fuck
IT WAS FUCKING STEAM BETA

IT WAS FUCKING STEAMWEBHELPER

brother I hate linux
ignore that

it didn't work

memtest time
November 10, 2025 at 1:36 PM
2025-02-03
"Zen and the Art of Microcode Hacking"
By Josh Eads et al.
Added at darkmentor.com/timeline.htm...
Low Level PC/Server Attack & Defense Timeline — By @XenoKovah of @DarkMentorLLC
darkmentor.com
November 10, 2025 at 11:28 AM
Corsair gaming PC kills third Core i9-14900K in a year, thanks to locked OEM BIOS with old microcode
Corsair gaming PC kills third Core i9-14900K in a year, thanks to locked OEM BIOS with old microcode - VideoCardz.com
Tech shop blames Corsair OEM BIOS for repeat Core i9 failures in Vengeance i8200 PC It uses a standard ASUS Z790-P motherboard, but with special BIOS that prevents easy microcode update. Repair shop “Matt’s...
videocardz.com
November 10, 2025 at 11:02 AM
Anyway, that's how you do it on simh, so I'm assuming that if I emulate the console microcode + standalone backup through RS-232, and emulate RB80 and TU(77, I guess; whatever the default is in simh) with a Unibone, it will work the same on the iron (which at that point is just CPU+memory).
November 9, 2025 at 9:22 PM
I'm in the US, in Tucson, AZ. The -58 tape images came from Vaxorcist on the DEC Fan Spot Discord. If you PM me an email address I can send those to you (along with the console microcode one you probably already have).

Booted under simh, from BE-T1751-ME.dms in td0 (the console ucode)... 1/2
November 9, 2025 at 9:17 PM
Senior CPU Microcode Design Engineer - USA - TX - Austin Job educativ.net/jobs/job/48281...
November 7, 2025 at 11:37 AM
AMD red-faced over random-number bug that kills cryptographic security

Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way
AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic key…
#hackernews #news
AMD red-faced over random-number bug that kills cryptographic security
Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic keys across Epyc and Ryzen CPUs.…
go.theregister.com
November 6, 2025 at 2:28 PM
i will also accept another processor with a disastrous arbitrary microcode execution bug, should one surface
November 6, 2025 at 10:37 AM
thats why bugs like entrysign are so good. what if you just did the microcode and firmware yourself too
November 6, 2025 at 10:16 AM
Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic keys across Epyc and Ryzen CPUs.…
AMD red-faced over random-number bug that kills cryptographic security
Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic keys across Epyc and Ryzen CPUs.…
go.theregister.com
November 5, 2025 at 3:30 PM
Is it Intel 13 or 14 generation?
These have a known bug that causes slow degradation of the CPU, leading to memory corruption like symptoms. e.g. Errors when extracting archives/installers.
There is firmware/microcode fix, but it just stops further degradation.
November 4, 2025 at 9:11 PM
AMD's Zen 5 RDSEED Issue Is Causing Headaches For Optimized CachyOS Builds AMD's RDSEED issue with Zen 5 processors that is in the process of being addressed with microcode/BIOS updates is ...

Origin | Interest | Match
AMD's Zen 5 RDSEED Issue Is Causing Headaches For Optimized CachyOS Builds
AMD's RDSEED issue with Zen 5 processors that is in the process of being addressed with microcode/BIOS updates is in the interim causing headaches for Arch Linux powered CachyOS that provides optimized binaries for these latest Ryzen processors...
www.phoronix.com
November 4, 2025 at 1:39 PM
I would recommend full AMD or at least Ryzen CPU setup since intel has issues with frying CPUs and mobos due to microcode issues and is expensive as well as nvidia gpus, I'm not really good at calculating bottlenecks and pairing stuff so I won't be able to recommend exact hardware and stuff
November 4, 2025 at 12:34 PM
High-Severity Bug: AMD Zen 5 RDSEED Flaw Risks Randomness Integrity; Microcode Fix Coming
High-Severity Bug: AMD Zen 5 RDSEED Flaw Risks Randomness Integrity; Microcode Fix Coming
securityonline.info
November 3, 2025 at 7:05 AM
High-Severity Bug: AMD Zen 5 RDSEED Flaw Risks Randomness Integrity; Microcode Fix Coming
High-Severity Bug: AMD Zen 5 RDSEED Flaw Risks Randomness Integrity; Microcode Fix Coming
AMD confirmed a high-severity bug in Zen 5 CPUs where the 16/32-bit RDSEED returns non-random values. Microcode fixes roll out starting Nov 14 (EPYC) & late Nov (Ryzen).
securityonline.info
November 3, 2025 at 4:08 AM
I got to the section in the Gentoo Handbook about updating microcode. I've heard that term before, but I don't really understand what microcode is. I ended up going down a rabbit hole and discovering a layer of the compute stack I didn't even realize existed
November 1, 2025 at 7:18 AM