CVE-2025-20623
Publication date 13 May 2025
Last updated 14 May 2025
Ubuntu priority
Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel(R) Core⢠processors (10th Generation) may allow an authenticated user to potentially enable information disclosure via local access.
Status
Package | Ubuntu Release | Status |
---|---|---|
intel-microcode | 25.04 plucky |
Needs evaluation
|
24.10 oracular |
Needs evaluation
|
|
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty |
Needs evaluation
|
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2025-20623
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html
- https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250512
- https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01247.html