{"id":"MGASA-2025-0124","summary":"Updated microcode packages fix security vulnerability","details":"Improper signature verification in AMD CPU ROM microcode patch loader\nmay allow an attacker with local administrator privilege to load\nmalicious CPU microcode resulting in loss of confidentiality and\nintegrity of a confidential guest running under AMD SEV-SNP.\n(CVE-2024-56161)\n","modified":"2026-01-31T07:06:09.109874Z","published":"2025-04-03T22:52:14Z","related":["CVE-2024-56161"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2025-0124.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=34149"},{"type":"REPORT","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00024.html"}],"affected":[{"package":{"name":"microcode","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/microcode?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.20250211-2.mga9.nonfree"}]}],"ecosystem_specific":{"section":"nonfree"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2025-0124.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}