Back to home
Technology

Intel software fixes stamp down privilege escalation vulnerabilities, while microcode updates clean up CPU messes — chipmaker has its own Patch Tuesday as it stomps down 30 bugs

Source

Tom's Hardware

Published

TL;DR

AI Generated

Intel released a series of software updates addressing privilege escalation vulnerabilities and microcode issues in their CPUs, including a significant UEFI Server Firmware exploit. The updates also cover bugs in Intel ProSet Wi-Fi and Intel Arc B-series GPU drivers, with recommendations for users to update to the latest versions. The microcode fixes address issues with CPU instructions and power-saving features across various processor lines. Additionally, Arrow Lake CPUs received fixes, and a patch was provided for dropped packets in isochronous USB 3.2 input devices, potentially affecting video and audio equipment.

Read Full Article

Similar Articles

Intel details 18A-P process node, touts higher performance, lower power, and better thermals — 9% more performance, thermal conductivity improved by 50%

Intel details 18A-P process node, touts higher performance, lower power, and better thermals — 9% more performance, thermal conductivity improved by 50%

Intel is progressing with its 18A-P process node technology, boasting higher performance, lower power consumption, and improved thermals compared to its baseline 18A technology. The 18A-P process introduces new transistors, tighter process variability control, and enhanced thermals, potentially attracting interest from companies like Apple. This enhanced technology offers a 9% performance boost or an 18% power reduction compared to the base 18A process. Additionally, improvements in skew corner tightening, threshold voltage options, and metal stack resistance and capacitance contribute to better performance efficiency and yield. The 18A-P process also focuses on enhancing thermals, reliability, and voltage behavior critical for both client and data center applications.

Tom's Hardware
Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users

Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users

A recent Linux exploit, CVE-2026-31431, allows local unprivileged users to gain root access instantly on most Linux distributions since 2017. The exploit affects popular distros like Ubuntu, RHEL, Suse, and Amazon Linux, as well as Windows' WSL2. The vulnerability, discovered by Xint Code researchers, involves a cryptography optimization flaw that grants administrator privileges through a devious attack on the AF_ALG socket. While a patch has been released, some distributions may still be vulnerable, requiring mitigation methods like disabling AF_ALG sockets. The exploit occurs in memory without leaving detectable traces on disk, making it challenging to detect with security software.

Tom's Hardware
The most severe Linux threat to surface in years catches the world flat-footed

The most severe Linux threat to surface in years catches the world flat-footed

A critical Linux vulnerability, named CopyFail (CVE-2026-31431), has been disclosed by security researchers, allowing unprivileged users to gain root access across various Linux distributions. The exploit code, released by Theori, works universally without modification, posing a significant threat to data centers and personal devices. While the Linux kernel security team patched the vulnerability in several versions, many distributions had not yet implemented the fixes at the time of the exploit's release. This flaw enables attackers to execute malicious activities like hacking multi-tenant systems and creating backdoors, emphasizing the severity of the issue.

Ars Technica
Crucial Taiwan undersea cable severed by old shipwreck — backup microwave communications activated to keep population connected

Crucial Taiwan undersea cable severed by old shipwreck — backup microwave communications activated to keep population connected

A shipwreck off Dongyin island in Taiwan has severed the undersea cable connecting it to Beigan Island, prompting the activation of backup microwave communications to maintain connectivity for the 1,500 residents. The Matsu Islands' strategic location near mainland China and the Taiwan Strait makes them crucial for Taiwan's military presence. While this incident was due to natural causes, it underscores Taiwan's vulnerability in its global connections. Recent suspicions of deliberate undersea cable damage by Chinese ships have led Taiwan to increase defensive measures and penalties for sabotage attempts. Despite wireless backups, physical undersea cables remain essential for reliable and high-bandwidth internet connections.

Tom's Hardware

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.