Technical Deep Dive: Analyzing Ubuntu's USN-7866-1 Intel Microcode Patch.
We've deconstructed the latest critical security advisory for #Ubuntu, covering the CVEs, the exploit mechanisms, and the essential patching procedure. Read more: 👉 tinyurl.com/5n837b24 #Security
We've deconstructed the latest critical security advisory for #Ubuntu, covering the CVEs, the exploit mechanisms, and the essential patching procedure. Read more: 👉 tinyurl.com/5n837b24 #Security
Critical Intel Microcode Vulnerabilities Patched in Ubuntu Security Update USN-7866-1
Blog com notícias sobre, Linux, Android, Segurança , etc
tinyurl.com
November 11, 2025 at 9:19 AM
Technical Deep Dive: Analyzing Ubuntu's USN-7866-1 Intel Microcode Patch.
We've deconstructed the latest critical security advisory for #Ubuntu, covering the CVEs, the exploit mechanisms, and the essential patching procedure. Read more: 👉 tinyurl.com/5n837b24 #Security
We've deconstructed the latest critical security advisory for #Ubuntu, covering the CVEs, the exploit mechanisms, and the essential patching procedure. Read more: 👉 tinyurl.com/5n837b24 #Security
Ubuntu: Intel Microcode Critical Escalation Threat USN-7866-1 Several security issues were fixed in Intel Microcode.
Interest | Match | Feed
Interest | Match | Feed
Origin
linuxsecurity.com
November 11, 2025 at 2:57 AM
You remember when I was on Windows and I had to hunt down a couple of microcode updates for my processor and it was a pain in the fucking keister?
Yeah, Linux does that automatically for me.
Yeah, Linux does that automatically for me.
November 11, 2025 at 12:26 AM
You remember when I was on Windows and I had to hunt down a couple of microcode updates for my processor and it was a pain in the fucking keister?
Yeah, Linux does that automatically for me.
Yeah, Linux does that automatically for me.
Ubuntu: Intel Microcode Critical Escalation Threat USN-7866-1 Several security issues were fixed in Intel Microcode.
#Ubuntu #Linux #Distribution #- #Security #Advisories
Origin | Interest | Match
#Ubuntu #Linux #Distribution #- #Security #Advisories
Origin | Interest | Match
Ubuntu 7866-1: Intel Microcode Critical Escalation Risks
Fixes for critical issues in Intel microcode across multiple Ubuntu releases. Essential updates for privilege escalation risks.
linuxsecurity.com
November 11, 2025 at 2:58 AM
Ubuntu: Intel Microcode Critical Escalation Threat USN-7866-1 Several security issues were fixed in Intel Microcode.
#Ubuntu #Linux #Distribution #- #Security #Advisories
Origin | Interest | Match
#Ubuntu #Linux #Distribution #- #Security #Advisories
Origin | Interest | Match
That's more similar to the parsed regex generated from oracle that MTGO parsed to make every single card's microcode definitions.
Now THAT thing was awe inspiring.
Now THAT thing was awe inspiring.
November 10, 2025 at 11:43 PM
That's more similar to the parsed regex generated from oracle that MTGO parsed to make every single card's microcode definitions.
Now THAT thing was awe inspiring.
Now THAT thing was awe inspiring.
ITS BACK
ITS BACK
ITS CRASHING AGAIN
apparently its microcode something fuck
ITS BACK
ITS CRASHING AGAIN
apparently its microcode something fuck
IT WAS FUCKING STEAM BETA
IT WAS FUCKING STEAMWEBHELPER
brother I hate linux
IT WAS FUCKING STEAMWEBHELPER
brother I hate linux
ignore that
it didn't work
memtest time
it didn't work
memtest time
November 10, 2025 at 1:36 PM
ITS BACK
ITS BACK
ITS CRASHING AGAIN
apparently its microcode something fuck
ITS BACK
ITS CRASHING AGAIN
apparently its microcode something fuck
2025-02-03
"Zen and the Art of Microcode Hacking"
By Josh Eads et al.
Added at darkmentor.com/timeline.htm...
"Zen and the Art of Microcode Hacking"
By Josh Eads et al.
Added at darkmentor.com/timeline.htm...
Low Level PC/Server Attack & Defense Timeline — By @XenoKovah of @DarkMentorLLC
darkmentor.com
November 10, 2025 at 11:28 AM
2025-02-03
"Zen and the Art of Microcode Hacking"
By Josh Eads et al.
Added at darkmentor.com/timeline.htm...
"Zen and the Art of Microcode Hacking"
By Josh Eads et al.
Added at darkmentor.com/timeline.htm...
Corsair gaming PC kills third Core i9-14900K in a year, thanks to locked OEM BIOS with old microcode
Corsair gaming PC kills third Core i9-14900K in a year, thanks to locked OEM BIOS with old microcode - VideoCardz.com
Tech shop blames Corsair OEM BIOS for repeat Core i9 failures in Vengeance i8200 PC It uses a standard ASUS Z790-P motherboard, but with special BIOS that prevents easy microcode update. Repair shop “Matt’s...
videocardz.com
November 10, 2025 at 11:02 AM
Corsair gaming PC kills third Core i9-14900K in a year, thanks to locked OEM BIOS with old microcode
Anyway, that's how you do it on simh, so I'm assuming that if I emulate the console microcode + standalone backup through RS-232, and emulate RB80 and TU(77, I guess; whatever the default is in simh) with a Unibone, it will work the same on the iron (which at that point is just CPU+memory).
November 9, 2025 at 9:22 PM
Anyway, that's how you do it on simh, so I'm assuming that if I emulate the console microcode + standalone backup through RS-232, and emulate RB80 and TU(77, I guess; whatever the default is in simh) with a Unibone, it will work the same on the iron (which at that point is just CPU+memory).
I'm in the US, in Tucson, AZ. The -58 tape images came from Vaxorcist on the DEC Fan Spot Discord. If you PM me an email address I can send those to you (along with the console microcode one you probably already have).
Booted under simh, from BE-T1751-ME.dms in td0 (the console ucode)... 1/2
Booted under simh, from BE-T1751-ME.dms in td0 (the console ucode)... 1/2
November 9, 2025 at 9:17 PM
I'm in the US, in Tucson, AZ. The -58 tape images came from Vaxorcist on the DEC Fan Spot Discord. If you PM me an email address I can send those to you (along with the console microcode one you probably already have).
Booted under simh, from BE-T1751-ME.dms in td0 (the console ucode)... 1/2
Booted under simh, from BE-T1751-ME.dms in td0 (the console ucode)... 1/2
Senior CPU Microcode Design Engineer - USA - TX - Austin Job educativ.net/jobs/job/48281...
November 7, 2025 at 11:37 AM
Senior CPU Microcode Design Engineer - USA - TX - Austin Job educativ.net/jobs/job/48281...
AMD red-faced over random-number bug that kills cryptographic security
Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way
AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic key…
#hackernews #news
Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way
AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic key…
#hackernews #news
AMD red-faced over random-number bug that kills cryptographic security
Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way
AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic keys across Epyc and Ryzen CPUs.…
go.theregister.com
November 6, 2025 at 2:28 PM
AMD red-faced over random-number bug that kills cryptographic security
Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way
AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic key…
#hackernews #news
Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way
AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic key…
#hackernews #news
i will also accept another processor with a disastrous arbitrary microcode execution bug, should one surface
November 6, 2025 at 10:37 AM
i will also accept another processor with a disastrous arbitrary microcode execution bug, should one surface
thats why bugs like entrysign are so good. what if you just did the microcode and firmware yourself too
November 6, 2025 at 10:16 AM
thats why bugs like entrysign are so good. what if you just did the microcode and firmware yourself too
Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic keys across Epyc and Ryzen CPUs.…
AMD red-faced over random-number bug that kills cryptographic security
Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic keys across Epyc and Ryzen CPUs.…
go.theregister.com
November 5, 2025 at 3:30 PM
Local privileges required to exploit flaw in Ryzen and Epyc CPUs. Some patches available, more on the way AMD will issue a microcode patch for a high-severity vulnerability that could weaken cryptographic keys across Epyc and Ryzen CPUs.…
Is it Intel 13 or 14 generation?
These have a known bug that causes slow degradation of the CPU, leading to memory corruption like symptoms. e.g. Errors when extracting archives/installers.
There is firmware/microcode fix, but it just stops further degradation.
These have a known bug that causes slow degradation of the CPU, leading to memory corruption like symptoms. e.g. Errors when extracting archives/installers.
There is firmware/microcode fix, but it just stops further degradation.
November 4, 2025 at 9:11 PM
Is it Intel 13 or 14 generation?
These have a known bug that causes slow degradation of the CPU, leading to memory corruption like symptoms. e.g. Errors when extracting archives/installers.
There is firmware/microcode fix, but it just stops further degradation.
These have a known bug that causes slow degradation of the CPU, leading to memory corruption like symptoms. e.g. Errors when extracting archives/installers.
There is firmware/microcode fix, but it just stops further degradation.
AMD's Zen 5 RDSEED Issue Is Causing Headaches For Optimized CachyOS Builds AMD's RDSEED issue with Zen 5 processors that is in the process of being addressed with microcode/BIOS updates is ...
Origin | Interest | Match
Origin | Interest | Match
AMD's Zen 5 RDSEED Issue Is Causing Headaches For Optimized CachyOS Builds
AMD's RDSEED issue with Zen 5 processors that is in the process of being addressed with microcode/BIOS updates is in the interim causing headaches for Arch Linux powered CachyOS that provides optimized binaries for these latest Ryzen processors...
www.phoronix.com
November 4, 2025 at 1:39 PM
I would recommend full AMD or at least Ryzen CPU setup since intel has issues with frying CPUs and mobos due to microcode issues and is expensive as well as nvidia gpus, I'm not really good at calculating bottlenecks and pairing stuff so I won't be able to recommend exact hardware and stuff
November 4, 2025 at 12:34 PM
I would recommend full AMD or at least Ryzen CPU setup since intel has issues with frying CPUs and mobos due to microcode issues and is expensive as well as nvidia gpus, I'm not really good at calculating bottlenecks and pairing stuff so I won't be able to recommend exact hardware and stuff
High-Severity Bug: AMD Zen 5 RDSEED Flaw Risks Randomness Integrity; Microcode Fix Coming
High-Severity Bug: AMD Zen 5 RDSEED Flaw Risks Randomness Integrity; Microcode Fix Coming
securityonline.info
November 3, 2025 at 7:05 AM
High-Severity Bug: AMD Zen 5 RDSEED Flaw Risks Randomness Integrity; Microcode Fix Coming
High-Severity Bug: AMD Zen 5 RDSEED Flaw Risks Randomness Integrity; Microcode Fix Coming
High-Severity Bug: AMD Zen 5 RDSEED Flaw Risks Randomness Integrity; Microcode Fix Coming
AMD confirmed a high-severity bug in Zen 5 CPUs where the 16/32-bit RDSEED returns non-random values. Microcode fixes roll out starting Nov 14 (EPYC) & late Nov (Ryzen).
securityonline.info
November 3, 2025 at 4:08 AM
High-Severity Bug: AMD Zen 5 RDSEED Flaw Risks Randomness Integrity; Microcode Fix Coming
I got to the section in the Gentoo Handbook about updating microcode. I've heard that term before, but I don't really understand what microcode is. I ended up going down a rabbit hole and discovering a layer of the compute stack I didn't even realize existed
November 1, 2025 at 7:18 AM
I got to the section in the Gentoo Handbook about updating microcode. I've heard that term before, but I don't really understand what microcode is. I ended up going down a rabbit hole and discovering a layer of the compute stack I didn't even realize existed
Re: Xen Security Notice 2 (CVE-2024-35347) AMD CPU Microcode Signature Verification Vulnerability
oss-sec: Re: Xen Security Notice 2 (CVE-2024-35347) AMD CPU Microcode Signature Verification Vulnerability
Posted by Solar Designer on Oct 31 Posting the referenced comment directly in here for those too busy to
visit links and for archival:
+NOTE: In order to not fully abandon machines affected by AMD-SB-7033 [1] that
+have not received the BIOS update, the family 19h microcode container now
+includes a second patch for these machines that brings the microcode to the
+highest possible level without the microcode signing fix. While a BIOS update
+is highly recommended to receive the...
seclists.org
November 1, 2025 at 2:38 AM
Re: Xen Security Notice 2 (CVE-2024-35347) AMD CPU Microcode Signature Verification Vulnerability